US7028098B2 - Selective routing of data flows using a TCAM - Google Patents

Selective routing of data flows using a TCAM Download PDF

Info

Publication number
US7028098B2
US7028098B2 US09/909,739 US90973901A US7028098B2 US 7028098 B2 US7028098 B2 US 7028098B2 US 90973901 A US90973901 A US 90973901A US 7028098 B2 US7028098 B2 US 7028098B2
Authority
US
United States
Prior art keywords
index
tcam
flows
flow
partition
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Lifetime, expires
Application number
US09/909,739
Other versions
US20030056001A1 (en
Inventor
Ashutosh Mate
Atul Mahamuni
Vijay Chander
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Nokia Technologies Oy
Nokia Inc
Original Assignee
Nokia Inc
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Nokia Inc filed Critical Nokia Inc
Priority to US09/909,739 priority Critical patent/US7028098B2/en
Assigned to AMBER NETWORKS, INC. reassignment AMBER NETWORKS, INC. ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: CHANDER, VIJAY, MAHAMUNI, ATUL, MATE, ASHUTOSH
Priority to CNB028024532A priority patent/CN1282104C/en
Priority to EP02748075A priority patent/EP1352334A4/en
Priority to PCT/US2002/021229 priority patent/WO2003012672A2/en
Priority to CA002422439A priority patent/CA2422439A1/en
Priority to JP2003517777A priority patent/JP3800546B2/en
Publication of US20030056001A1 publication Critical patent/US20030056001A1/en
Assigned to NOKIA INTELLIGENT EDGE ROUTERS, INC. reassignment NOKIA INTELLIGENT EDGE ROUTERS, INC. ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: AMBER NETWORKS, INC.
Assigned to NOKIA, INC. reassignment NOKIA, INC. MERGER (SEE DOCUMENT FOR DETAILS). Assignors: NOKIA INTELLIGENT EDGE ROUTERS, INC.
Publication of US7028098B2 publication Critical patent/US7028098B2/en
Application granted granted Critical
Assigned to NOKIA CORPORATION reassignment NOKIA CORPORATION ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: NOKIA INC.
Assigned to NOKIA TECHNOLOGIES OY reassignment NOKIA TECHNOLOGIES OY ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: NOKIA CORPORATION
Adjusted expiration legal-status Critical
Expired - Lifetime legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L47/00Traffic control in data switching networks
    • H04L47/50Queue scheduling
    • H04L47/62Queue scheduling characterised by scheduling criteria
    • H04L47/6215Individual queue per QOS, rate or priority
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L45/00Routing or path finding of packets in data switching networks
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L45/00Routing or path finding of packets in data switching networks
    • H04L45/50Routing or path finding of packets in data switching networks using label swapping, e.g. multi-protocol label switch [MPLS]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L45/00Routing or path finding of packets in data switching networks
    • H04L45/54Organization of routing tables
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L45/00Routing or path finding of packets in data switching networks
    • H04L45/74Address processing for routing
    • H04L45/745Address table lookup; Address filtering
    • H04L45/74591Address table lookup; Address filtering using content-addressable memories [CAM]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L47/00Traffic control in data switching networks
    • H04L47/10Flow control; Congestion control
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L47/00Traffic control in data switching networks
    • H04L47/10Flow control; Congestion control
    • H04L47/24Traffic characterised by specific attributes, e.g. priority or QoS
    • H04L47/2441Traffic characterised by specific attributes, e.g. priority or QoS relying on flow classification, e.g. using integrated services [IntServ]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L47/00Traffic control in data switching networks
    • H04L47/50Queue scheduling
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L47/00Traffic control in data switching networks
    • H04L47/50Queue scheduling
    • H04L47/62Queue scheduling characterised by scheduling criteria
    • H04L47/625Queue scheduling characterised by scheduling criteria for service slots or service orders
    • H04L47/627Queue scheduling characterised by scheduling criteria for service slots or service orders policing
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L49/00Packet switching elements
    • H04L49/90Buffering arrangements
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L49/00Packet switching elements
    • H04L49/90Buffering arrangements
    • H04L49/901Buffering arrangements using storage descriptor, e.g. read or write pointers
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L49/00Packet switching elements
    • H04L49/90Buffering arrangements
    • H04L49/9036Common buffer combined with individual queues
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L49/00Packet switching elements
    • H04L49/90Buffering arrangements
    • H04L49/9047Buffering arrangements including multiple buffers, e.g. buffer pools
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L49/00Packet switching elements
    • H04L49/90Buffering arrangements
    • H04L49/9063Intermediate storage in different physical parts of a node or terminal
    • H04L49/9068Intermediate storage in different physical parts of a node or terminal in the network interface card
    • H04L49/9073Early interruption upon arrival of a fraction of a packet
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L12/00Data switching networks
    • H04L12/54Store-and-forward switching systems 
    • H04L12/56Packet switching systems
    • H04L12/5601Transfer mode dependent, e.g. ATM

Definitions

  • This invention relates to network communications and more particularly to selectively routing a plurality of data flows, such as, Multi-Protocol Label Switching (“MPLS”), Internet Protocol (IP) Virtual Private Network (“VPN”) data packets and policy based routing data packets, using a ternary content addressable memory (“TCAM”).
  • MPLS Multi-Protocol Label Switching
  • IP Internet Protocol
  • VPN Virtual Private Network
  • TCAM ternary content addressable memory
  • Network providers are interested in providing centralized network services to meet customer demands.
  • QoS IP quality of service
  • MPLS multiprotocol label switching
  • service transformation technology the conversion of non-IP services to IP
  • MPLS is a standards-approved technology for speeding up network traffic flow and making it easier to manage.
  • MPLS involves setting up a specific path for a given sequence of packets, identified by a label put in each packet, thereby saving the time needed for a router to look up the address to the next node.
  • MPLS is called multiprotocol because it works with the Internet Protocol (“IP”), Asynchronous Transport Mode (“ATM”), and various frame relay network protocols.
  • IP Internet Protocol
  • ATM Asynchronous Transport Mode
  • MPLS allows most packets to be forwarded at the layer 2 (switching) level of the standard Open Systems Interconnection (“OSI”) rather than at the layer 3 (routing) level.
  • OSI Open Systems Interconnection
  • MPLS makes it easy to manage a network for quality of service (“QoS”). For these reasons, the technique is expected to be readily adopted as networks begin to carry more and different mixtures of traffic.
  • QoS quality of service
  • IP data packets are routed from source to destination through a series of routers which receive the IP data packet, read the source and/or destination addresses and re-transmit the IP data packet either to the destination indicated as indicated by the IP destination addressed contained in the IP data packet or to another router which will forward the IP data packet until the IP data packet reaches the destination address, referred to as hop by hop routing.
  • IP packet headers have fields for IP source and/or destination addresses. Routing protocols such as Routing Information Protocol (“RIP”) and Open Shortest Path First (“OSPF”) enable each machine to understand which other machine in the “next hop” that a packet should take toward its destination.
  • RIP Routing Information Protocol
  • OSPF Open Shortest Path First
  • the IP packets are encapsulated with labels by the first MPLS device they encounter as they enter the network.
  • the MPLS edge router analyses the contents of the IP header and selects an appropriate label with which to encapsulate the packet. In contrast to conventional IP routing, the router analysis can be based on more than just the destination address carried in the IP header. At all the subsequent nodes within the network the MPLS label, and not the IP header, is used to make the forwarding decision for the packet. As MPLS labeled packets leave the network, another edge router removes the labels.
  • the packet handling nodes or routers are called Label Switched Routers (LSRs). MPLS routers forward packets by making switching decisions based on the MPLS label.
  • LSRs Label Switched Routers
  • a CAM is a storage device that can be instructed to compare a specific pattern of comparand data with data stored in its associative CAM array. The entire CAM array, or segments thereof, are searched in parallel for a match with the comparand data. If a match exists, the CAM device indicates the match by asserting a match flag. Multiple matches may also be indicated by asserting a multiple match flag.
  • the CAM device typically includes a priority encoder to translate the highest priority matching location into a match address or CAM index.
  • the generally fast parallel search capabilities of CAMs have proven useful in many applications including address filtering and lookups in routers and networking equipment, policy enforcement in policy-based routers, pattern recognition for encryption/decryption and compression/decompression applications, and other pattern recognition applications.
  • Binary CAM cells are able to store two states of information: a logic one state and a logic zero state.
  • Binary CAM cells typically include a RAM cell and a compare circuit. The compare circuit compares the comparand data with data stored in the RAM cell and drives a match line to a predetermined state when there is a match.
  • Columns of binary CAM cells may be globally masked by mask data stored in one or more global mask registers.
  • Ternary CAM cells are mask-per-bit CAM cells that effectively store three states of information, namely: a logic one state, a logic zero state, and a don't care state for compare operations.
  • Ternary CAM cells typically include a second RAM cell that stores local mask data for the each ternary CAM cell.
  • the local mask data masks the comparison result of the comparand data with the data stored in the first RAM cell such that the comparison result does not affect the match line.
  • the ternary CAM cell offers more flexibility to the user to determine on an entry-per-entry basis which bits in a word will be masked during a compare operation.
  • U.S. Pat. No. 6,237,061 describes a system in which Classless Inter-Domain Routing (CIDR) addresses are pre-sorted and loaded into the ternary CAM such that the CAM entry having the longest prefix is located at the highest numerical address or index.
  • the prefix portions of the CIDR addresses are used to set the masks cells associated with each CAM entry such that during compare operations, only the unmasked prefix portion of each CAM entry, which may correspond to a network ID field, is compared to an incoming destination address stored as the CAM search key. Since each CAM entry is masked according to an associated prefix value, the ternary CAM requires only one search operation to locate the CAM entry having the longest matching prefix.
  • IP Internet Protocol
  • VPN Virtual Private Networks
  • Policy-based routing services have also been described to allow customers to implement policies that selectively cause packets to take different paths.
  • Conventional applications of policy based routing have included: source based transit provider selection for routing traffic originating from different sets of users through different Internet connections across the policy routers; quality of service (QOS) for prioritizing traffic based on the type of service; and cost savings for distributing traffic between low-bandwidth, low cost permanent paths and high-bandwidth, high cost, switched paths.
  • QOS quality of service
  • the present invention relates to a method and system for supporting a plurality of data flows in a router using a ternary content addressable memory (TCAM) in which the number of accesses to the TCAM is optimized to improve efficiency of updating and subsequent look up.
  • TCAM ternary content addressable memory
  • the TCAM is partitioned into at least two partitions in which a first portion includes indices having a higher priority and a second portion includes indices having a lower priority.
  • MPLS protocol label switching
  • VPN IP-Virtual Private Network
  • FIG. 1 is a high-level functional block diagram of a system architecture for classifying flows in a router in accordance with the teachings of the present invention.
  • FIG. 2 is a schematic diagram of implementation of a flow classifier and flow manager.
  • FIG. 3 is a schematic diagram of a TCAM flow entry.
  • FIG. 4A is a schematic diagram of a prefix tree for storing flows classified by a connection index (CIX).
  • FIG. 4B is a schematic diagram of a prefix tree for storing flows classified by a destination address (DA).
  • FIG. 5A is a schematic diagram of data organization of a flow TCAM for MPLS and IP-VPN flows classified by CIX and DA before addition of the flow when no DA flow is present.
  • FIG. 5B is a schematic diagram of data organization of a flow TCAM for MPLS and IP-VPN flows classified by CIX and DA after addition of the flow when no DA flow is present.
  • FIG. 5C is a schematic diagram of data organization of a flow TCAM for MPLS and IP-VPN flows classified by CIX and DA before addition of the flow when DA flow is present.
  • FIG. 5D is a schematic diagram of data organization of a flow TCAM for MPLS and IP-VPN flows classified by CIX and DA after addition of the flow when DA flow is present.
  • FIG. 6A is a schematic diagram of data organization of a flow TCAM for MPLS and IP-VPN flows classified by DA before addition of the flow when no CIX, DA or CIX flows are present.
  • FIG. 6B is a schematic diagram of data organization of a flow TCAM for MPLS and IP-VPN flows classified by DA after addition of the flow when no CIX, DA or CIX flows are present.
  • FIG. 6C is a schematic diagram of data organization of a flow TCAM for MPLS and IP-VPN flows classified by DA before addition of the flow when CIX, DA or CIX flows are present.
  • FIG. 6D is a schematic diagram of data organization of a flow TCAM for MPLS and IP-VPN flows classified by DA after addition of the flow when CIX, DA or CIX flows are present.
  • FIG. 7 is a schematic diagram of data organization of a flow TCAM for policy based routing flows.
  • a flow is a set of data packets that obey a rule or policy identified from the content of the packet header fields of the data packets.
  • the packet header fields can include for example the source IP address, destination IP address, source port, destination port, protocol identification, type of service (TOS), connection index (CIX) and other fields.
  • the architecture comprises three major elements, control plane 12 , data plane 13 and layer 2 interface 14 . The interaction between the various elements is represented by the series of arrows between corresponding elements.
  • Control plane 12 which can be implemented in software is comprised of flow manager 15 , data plane control interface 16 , flow core control 17 and IP, User Datagram Protocol (“UDP”) and Transmission Control Protocol (“TCP”) 18 .
  • Data plane 13 which can be implemented in hardware is comprised of flow classifier 20 , IP forwarder 21 and label forwarder 22 .
  • IP traffic and IP control traffic 23 is received at flow classifier 20 .
  • Flow classifier 20 interacts with flow manager 15 and flow core control 17 for classifying and routing IP traffic and IP control traffic 23 and applying destination routes through label forwarder 22 , in the case of MPLS flows, or IP forwarder 21 in the case of non-MPLS flows.
  • Flow core control 17 can comprise software modules such as, for example, TEP, red manager, label manager, route watch, routing manager and FIB and an IP routing data base. While the present invention is particularly well suited for use with the AmberNetwork ASR 2000 and ASR 2020 devices as described herein, it is equally suited for use with other routers having similar capabilities and features. The AmberNetwork ASR 2000 and ASR 2020 technical manuals are incorporated herein by reference as if fully set out.
  • FIG. 2 is a schematic diagram of an example implementation of flow classifier 20 and flow manager 15 .
  • flow classifier 20 comprises flow ternary content addressable memory (TCAM) 30 .
  • Flow TCAM 30 is a hardware memory device where all entries in the TCAM are compared in parallel against incoming packet header fields and the first matching entry is selected in a single clock cycle.
  • a suitable TCAM is manufactured by Lara Technology Inc., San Jose, Calif. and as described in U.S. Pat. No. 6,081,440 hereby incorporated by reference into this application.
  • Each flow TCAM 30 entry is addressed or indexed by indices 32 .
  • Indices 32 can be an index or numerical address. Indices 32 are arranged from lowest index 32 a to highest index 32 n with priority being greatest at lowest index 32 a and being least at highest index 32 n.
  • FIG. 3 illustrates a representative TCAM flow entry 33 to be stored in flow TCAM 30 .
  • a local mask 34 is associated with each TCAM flow entry 33 for effectively storing in flow TCAM 30 either a logic 0, a logic 1, or a don't care for a flow TCAM look up operation. For example, if a bit of local mask 34 is a logic 1, the corresponding bit of TCAM flow entry 33 is compared to a corresponding bit of an incoming data packet during a subsequent flow TCAM look up operation. Conversely, if local mask 34 is a logic 0, the corresponding bit of TCAM flow entry 33 is not compared during a subsequent flow TCAM look up operation.
  • the mask bit scheme can be inverted such that a mask bit is equal to logic 1, the corresponding bit of the TCAM flow entry is masked and if a mask bit is equal to a logic 0 the corresponding bit of the TCAM flow entry is compared.
  • a prefix can be associated with one or more of the fields in flow TCAM entry 33 , such as the destination IP address, to indicate the number of bits of the destination IP address of the packet header to be matched in flow TCAM 30 .
  • Flow manager 15 is used to provide data structure organization of flow TCAM 30 .
  • flow manager 15 can partition indices 32 into one or more logical partitions. Flows are assigned to partitions depending on a desired priority for the type of flow.
  • indices 32 are partitioned into partition 36 a which partition includes lowest index 32 a and partition 36 b which partition includes highest index 32 n .
  • a FTCAM_Partition index is located between partition 36 a and partition 36 b .
  • MPLS and IP-VPN flows are determined to have the highest priority and are assigned to partition 36 a .
  • Policy-based routing flows are determined to have lower priority and are assigned to partition 36 b .
  • Policy based routing flows can include data classified by Access Control Lists (ACL) flows and traffic manager (TE) flows. Accordingly, MPLS flows and IP-VPN flows which have been assigned higher priority will be found in a subsequent lookup in flow TCAM 30 before ACL flows and TE flows which have been assigned a lower priority and MPLS flows or P VPN flows will subsume any matching ACL flows and TE flows in flow TCAM 30 .
  • ACL Access Control Lists
  • TE traffic manager
  • Flow index space 38 can be maintained in flow manager 15 to correspond to data organization of flow TCAM 30 . All flow swapping can be performed in flow index space 38 and only the changed entries are written to the flow TCAM 30 .
  • an array of pointers and prefix trees are used to store MPLS and IP-VPN flows in flow index space 38 , as shown in FIGS. 4A and 4B .
  • Each connection index (CIX1–CIX16K) is associated with node 41 a – 41 n of prefix tree 40 .
  • a destination IP address based lookup is performed to find the longest match of a prefix stored in a respective node 41 a – 41 n .
  • Flows are maintained in order to match the correct flow during flow TCAM 30 look up.
  • a variable gMaxCixDaFix is used in flow index space 38 to indicate the maximum flow TCAM Index of the CIX and DA flows and CIX only flows. Flows which are classified by destination IP address only are stored in DA prefix tree 42 . Each DA is associated with node 44 of prefix tree 42 .
  • a variable gMinDaOnlyFix is used in flow index space 38 to indicate the minimum flow TCAM index for DA only flows
  • a software module can be implemented in flow manager 15 for MPLS and IP-VPN flow organization of TCAM 30 .
  • a representative software module is illustrated in Table 1.
  • typedef struct_flowlkuptabentry ⁇ FM_PR_TREE *pfTreePtr; ⁇ FM_FLOWLKUP_TABLE_ENTRY; typedef struct _lookuptable ⁇ FM_FLOWLKUP_TABLE_ENTRY flowLkupTable[FM_MAX_CIX]; ⁇ FM_FLOWLKUP_TABLE; typedef struct _fmprtreenode ⁇ PR_NODE prNode; /* PR_NODE contains RB_NODE + prefix and mask */ FM_FLOW flowObject; ⁇ FM_PR_NODE; typedef struct _fmprefixtree ⁇ PR_TREE prTree; /* root of prefix tree */ ⁇ FM_PR_TREE;
  • FIGS. 5A–5D illustrate an example of data organization of flow TCAM 30 for MPLS and IP-VPN flows. Flows are maintained in order to match the correct flow during flow TCAM 30 look up. Partition 36 a is divided into lower index portion 50 a and higher index portion 50 b . Lower index portion 50 a corresponds to a lower index or address range and higher index portion 50 b corresponds to a higher index or address range. Flows which are to be classified by the connection index (CIX) and Destination IP Address (DA) fields of the packet header, referred to as CIX, DA, are assigned to lower index portion 50 a . Flows which are classified only by the CIX of the packet header are also assigned to lower index portion 50 a .
  • CIX connection index
  • DA Destination IP Address
  • Local mask 34 can be applied to each flow TCAM entry 33 to effectively store the particular type of data flows, such as the above-described CIX, DA flows, CIX only flows and DA only flows, for use in compare operations of flow TCAM 30 .
  • CIX only flows can occur when local mask bits of the DA are zero and local mask bits of the CIX are all one.
  • a free entry in TCAM 30 is searched from lowest index 32 a of lower index portion 50 a .
  • the free entry is referred to as Fix.
  • a free entry in TCAM 30 is searched from highest index 32 b of highest index portion 50 b .
  • An index corresponding to a maximum value of lowest index portion 50 a is established as gMaxCixDaFix and an index corresponding to minimum value of a highest index portion 50 b is established as gMinDaOnlyFix.
  • maximum free space 54 is achieved between lower index portion 50 a and higher index portion 50 b , thereby maintaining the CIX, DA flows and CIX only flows together and the DA only flows together and separately the CIX, DA flows and CIX only flows from the DA flows.
  • the entry at a corresponding index 32 is invalidated in flow space 38 .
  • the invalidated entry is found during a search for free entries from lowest index 32 a of lower index portion 50 a the flow is added to re-use the previously invalidated entry.
  • TCAM 30 only if TCAM 30 is substantially at capacity will it be necessary to swap a DA only flow to insert a CIX, DA or CIX only flow or to swap a CIX, DA flow or CIX only flow to insert a DA only flow.
  • FIGS. 5A–5B illustrate assignment of CIX, DA flows and CIX only flows if no DA only flows exist or a free TCAM entry, Fix, is above the DA only flows at a lower index value than gMinDaOnlyFix.
  • the gMaxCixDaFix index entry is set immediately after the index corresponding to Fix.
  • FIGS. 5C–5D illustrate assignment of CIX, DA and CIX only flows if there are DA only flows present or a free TCAM entry, Fix, is between the DA only flows.
  • TCAM 30 is almost full. There exists no free entries from lowest index 32 a past gMaxCixDaFix and gMinDaOnlyFix indices.
  • the gMaxCixDaFix and gMinDaOnlyFix indices are adjacent indices.
  • a free entry is available between the index of gMinDaOnlyFix and highest index 32 b .
  • the free entry can occur in the Da flow space because of an earlier deletion of a DA flow.
  • Fix for a flow classified by CIX, DA or CIX only, the DA flow at the gMinDaOnlyFix index is moved into Fix, thereby making the gMinDaOnly Fix index available.
  • the flow classified by CIX, DA or CIX only is written at the current index for gMinDaOnlyFix.
  • the gMaxCixDaFix index is set at the written TCAM entry for the flow classified by CIX, DA or CIX only and the gMinDaOnlyFix entry is set immediately after the written TCAM entry.
  • the other CIX, DA and CIX only flows between lowest index 32 a and the gMaxCixDaOnlyFix index in TCAM 30 are adjusted for proper subsuming ordering.
  • the other DA only flows between the gMinDaOnlyFix index and highest index 32 b are adjusted for proper subsuming ordering.
  • a software module can be implemented in flow manager 15 for adding CIX, DA flows and CIX only flows to TCAM 30 .
  • a pointer to the current flow is referred to as pflow.
  • a pointer to the free entry is referred to as fix.
  • the TCAM flow entry 33 is written to flow TCAM 30 by an AdjustAndWriteCixDA(pflow, fix) function, described below in order to adjust the writing at TCAM flow entry 33 into flow TCAM 30 based on local mask 34 of other DAs in the same CIX.
  • a representative software module is illustrated in Table 2.
  • Tables 3 and 4 illustrate respective software modules which can be implemented in flow manager 15 for adjusting and writing DA only flows and adjusting and writing Fix and DA flows and which modules are used in the software module illustrated in Table 1.
  • Begin AdjustAndWriteDA(pFlow). 2. Using the mask length of the destination IP address in the flow, first fix the shorter-prefix flow in prefix tree 42. If a shorter prefix node is found in the ⁇ DA> only prefix tree 42, and the index of the found node is less than the index of the pFlow node, swap the two flows and write only the second flow to flow TCAM 30. Then continue search with the removed flow to locate routes that are subsumed. 3. Write the last best flow into its correct location and remember this so that it doesn't have to be re-written again below. 4.
  • pFlow is pointing to the shortest-prefix flow whose index had to be adjusted to follow a largest prefix match (LPM) property and that matched the original flow that had to be inserted in flow TCAM 30. 5.
  • Begin adjustAndWriteCixDA (pFlow, Fix) 2. Using the mask length of the destination IP address in the flow, first fix the shorter-prefix flow in prefix tree 40. If a shorter prefix node is found and the index of the found node is less than the index of the pFlow node, swap the two flows and write only the second flow to flow TCAM 30. Then continue search with the removed flow to locate routes that are subsumed. 3. Write the last best flow into its correct location and remember this so that it doesn't have to be re-written again below. 4. At this point pFlow is pointing to the shortest-prefix flow whose index had to be adjusted to follow LPM property and that matched the original flow that had to be inserted in flow TCAM 30. 5.
  • FIGS. 6A–6B illustrate assignment of DA only flows if the first free TCAM entry, Fix, is located after both CIX, DA flows and CIX only flows or if there are no CIX, DA flows.
  • the gMinDaOnlyFix index entry is set at the index corresponding to Fix.
  • FIGS. 6C–6D illustrate assignment of DA flows if the first free TCAM entry, Fix, is between CIX, DA or CIX only flows.
  • TCAM 30 is almost full. There exists no free entries from highest index 32 b past gMinDaOnlyFix and gMaxCixDaFix.
  • the gMaxCixDaFix and gMinDaOnlyFix indices are adjacent indices.
  • a free entry is available between the index of gMaxCixDaFix and lowest index 32 a .
  • the free entry can occur in CIX, DA and CIX only flow space because of an earlier deletion of a CIX, DA or CIX only flow.
  • Fix for a flow classified by DA only, the CIX, DA or CIX only flow at the gMaxCixDaFix index is moved into Fix, thereby making the gMaxCixDaFix index available.
  • the flow classified by DA is written at the current index for gMaxCixDaFix.
  • the gMinDaOnlyFix entry is set at the written TCAM entry and the gMaxCixDaFix entry is set immediately before the written TCAM entry.
  • the other DA flows between highest index 32 b and the gMinDaOnlyFix index are adjusted for proper subsuming ordering.
  • the other CIX, DA and CIX only flows between gMaxCixDaFix and lowest index 32 a are adjusted for proper subsuming ordering.
  • a software module can be implemented in flow manager 15 for adding DA flows to TCAM 30 .
  • a representative software module is illustrated in Table 5.
  • the clients of flow manager 15 are responsible for removing flows in TCAM 30 if an interface goes down.
  • Flow manager 15 provides an Application Programming Interface (APIs) to withdraw routes based on the application handle. For example, if an IP circuit goes down the connection manager informs the IP task and the VPN manager receives this alarm. The VPN manager in turn withdraws the routes from flow TCAM 30 based on the circuit identifiers.
  • APIs Application Programming Interface
  • a software module can be implemented in flow manager 15 for removing flows in TCAM 30 .
  • a representative software module is illustrated in Table 6.
  • ACL flows and traffic manager (TE) flows are internally stored in a flow index space corresponding to the Flow TCAM by the Flow Manager 15 , as shown in FIG. 7 .
  • the ACL flows and TE flows are strictly ordered based on the command line interface (CLI) defined access control lists (ACLs).
  • ACLs are typically applied to network interfaces to permit or deny certain kinds of network traffic. All packets matching a particular ACL flow will be allowed to pass through and a network route is determined. All packets not matching the ACL flow will be dropped or a policing or shaping of type of service (“TOS”) operation will be performed on the packets.
  • a global access-list is used at all interfaces.
  • the ACL and TE flows are maintained in order when added to flow TCAM 30 . Flows are added to the next available index entry located in flow TCAM 30 starting from top 60 of partition 36 b . Partition 36 b is further subdivided into portions 62 a and 62 b . Portion 62 a is used for ACLs applied to interfaces and portion 62 b is used for global ACLs which will be used if no other ACL matches.
  • a GACL_PARTITION variable can be used to define the partition size of portion 62 a and 62 b .
  • a gMaxACLFix variable defines a maximum flow TCAM index for ACL and TE flows in portion 62 a .
  • a gGlobalACLFix variable defines a maximum flow TCAM index for Global ACL & TE flows in portion 62 b.
  • An ACL flow can specify a range of source or destination ports.
  • the ACL flow that specifies a range of source or destination ports is mapped to multiple flows, with a local mask 34 to cover a portion of the range. Accordingly, the optimal number of flows with different masks are determined to cover the specified range.
  • an application programming interface API can create peer flows with an assigned local mask 34 and add the peer flows along with the parent flow to flow TCAM 30 which flows can be managed by flow manager 15 .
  • Global ACL flows are added at gGlobalACLFix variable and then the gGlobalACLFix variable is incremented. If the gGlobalACLFix variable becomes equal to a FM_MAX_FIX variable, then no more Global ACL flows can be added until some flows are deleted from TCAM 30 .
  • Flow manager 15 includes software modules which are responsible for removing flows from TCAM 30 .
  • First API 66 is used to delete a single flow from TCAM 30 . If the single flow has peer flows all of the peers will also be deleted. Flows remaining in flow TCAM 30 are compacted immediately in order to fill up the vacant flow space. All flows after the deleted flow are moved up by one index and are written to TCAM 30 . The value of the gMaxACLFix variable is adjusted accordingly.
  • a second API 67 is used to delete a list of flows for deleting multiple flows from TCAM 30 .
  • the first empty flow space is filled first by the next available occupied flow and this is repeated until all flows are compacted such that all empty flow spaces before the gMaxACLFix variable are filled up.
  • the value of the gMaxACLFix variable is adjusted accordingly.

Abstract

The present invention relates to a method and system for supporting in a router a plurality of data flows using a ternary content addressable memory (TCAM) in which the number of accesses to write to the TCAM is optimized to improve efficiency of updating and subsequent look up. To accommodate the plurality of data flows, the TCAM is partitioned into at least two partitions in which a first portion includes indices having a higher priority and a second portion includes indices having a lower priority. For example, multiple protocol label switching (MPLS) flows and IP-Virtual Private Network (VPN) can be added to the first partition and policy based routing flows can be added to the second partition. During subsequent TCAM look-up of a prefix of an incoming packet the MPLS or IP-VPN flow will subsume any matching policy based routing flow, such as flows classified by an access control list or traffic manager flows.

Description

FIELD OF THE INVENTION
This invention relates to network communications and more particularly to selectively routing a plurality of data flows, such as, Multi-Protocol Label Switching (“MPLS”), Internet Protocol (IP) Virtual Private Network (“VPN”) data packets and policy based routing data packets, using a ternary content addressable memory (“TCAM”).
BACKGROUND OF THE INVENTION
Network providers are interested in providing centralized network services to meet customer demands. By taking advantage of the latest advances in IP quality of service (“QoS”), multiprotocol label switching (“MPLS”), and service transformation technology (the conversion of non-IP services to IP), service providers can evolve dedicated IP infrastructures into a multi-service network architecture, as an alternative to operating separate service-specific networks.
MPLS is a standards-approved technology for speeding up network traffic flow and making it easier to manage. MPLS involves setting up a specific path for a given sequence of packets, identified by a label put in each packet, thereby saving the time needed for a router to look up the address to the next node. MPLS is called multiprotocol because it works with the Internet Protocol (“IP”), Asynchronous Transport Mode (“ATM”), and various frame relay network protocols. MPLS allows most packets to be forwarded at the layer 2 (switching) level of the standard Open Systems Interconnection (“OSI”) rather than at the layer 3 (routing) level. In addition to moving traffic faster overall, MPLS makes it easy to manage a network for quality of service (“QoS”). For these reasons, the technique is expected to be readily adopted as networks begin to carry more and different mixtures of traffic.
The essence of MPLS is the generation of a short fixed-length “label” that acts as a shorthand representation of an IP packet's header and the use of that label to make forwarding decisions about the packet. Typically, IP data packets are routed from source to destination through a series of routers which receive the IP data packet, read the source and/or destination addresses and re-transmit the IP data packet either to the destination indicated as indicated by the IP destination addressed contained in the IP data packet or to another router which will forward the IP data packet until the IP data packet reaches the destination address, referred to as hop by hop routing. IP packet headers have fields for IP source and/or destination addresses. Routing protocols such as Routing Information Protocol (“RIP”) and Open Shortest Path First (“OSPF”) enable each machine to understand which other machine in the “next hop” that a packet should take toward its destination.
In MPLS, the IP packets are encapsulated with labels by the first MPLS device they encounter as they enter the network. The MPLS edge router analyses the contents of the IP header and selects an appropriate label with which to encapsulate the packet. In contrast to conventional IP routing, the router analysis can be based on more than just the destination address carried in the IP header. At all the subsequent nodes within the network the MPLS label, and not the IP header, is used to make the forwarding decision for the packet. As MPLS labeled packets leave the network, another edge router removes the labels. In MPLS terminology, the packet handling nodes or routers are called Label Switched Routers (LSRs). MPLS routers forward packets by making switching decisions based on the MPLS label. There are two broad categories of LSR: MPLS edge routers, which are high performance packet classifiers that apply (and remove) the requisite label at the edge of the network; and Core LSRs which are capable of processing the labeled packets at extremely high bandwidths.
Traditional routing solutions for efficient use of IP addressing have included using a content addressable memory (CAM) device for storing IP addresses. A CAM is a storage device that can be instructed to compare a specific pattern of comparand data with data stored in its associative CAM array. The entire CAM array, or segments thereof, are searched in parallel for a match with the comparand data. If a match exists, the CAM device indicates the match by asserting a match flag. Multiple matches may also be indicated by asserting a multiple match flag. The CAM device typically includes a priority encoder to translate the highest priority matching location into a match address or CAM index. The generally fast parallel search capabilities of CAMs have proven useful in many applications including address filtering and lookups in routers and networking equipment, policy enforcement in policy-based routers, pattern recognition for encryption/decryption and compression/decompression applications, and other pattern recognition applications.
Binary CAM cells are able to store two states of information: a logic one state and a logic zero state. Binary CAM cells typically include a RAM cell and a compare circuit. The compare circuit compares the comparand data with data stored in the RAM cell and drives a match line to a predetermined state when there is a match. Columns of binary CAM cells may be globally masked by mask data stored in one or more global mask registers. Ternary CAM cells are mask-per-bit CAM cells that effectively store three states of information, namely: a logic one state, a logic zero state, and a don't care state for compare operations. Ternary CAM cells typically include a second RAM cell that stores local mask data for the each ternary CAM cell. The local mask data masks the comparison result of the comparand data with the data stored in the first RAM cell such that the comparison result does not affect the match line. The ternary CAM cell offers more flexibility to the user to determine on an entry-per-entry basis which bits in a word will be masked during a compare operation.
U.S. Pat. No. 6,237,061 describes a system in which Classless Inter-Domain Routing (CIDR) addresses are pre-sorted and loaded into the ternary CAM such that the CAM entry having the longest prefix is located at the highest numerical address or index. The prefix portions of the CIDR addresses are used to set the masks cells associated with each CAM entry such that during compare operations, only the unmasked prefix portion of each CAM entry, which may correspond to a network ID field, is compared to an incoming destination address stored as the CAM search key. Since each CAM entry is masked according to an associated prefix value, the ternary CAM requires only one search operation to locate the CAM entry having the longest matching prefix.
Some other network services which are offered by network providers include Internet Protocol (IP) Virtual Private Networks (VPN) to interconnect various customer sites that are geographically dispersed. VPNs offer privacy and cost efficiency through network infrastructure sharing. U.S. Pat. No. 6,205,488 describes a virtual private network including multiple routers connected to a shared MPLS network which are configured to dynamically distribute VPN information across the shared MPLS network.
Policy-based routing services have also been described to allow customers to implement policies that selectively cause packets to take different paths. Conventional applications of policy based routing have included: source based transit provider selection for routing traffic originating from different sets of users through different Internet connections across the policy routers; quality of service (QOS) for prioritizing traffic based on the type of service; and cost savings for distributing traffic between low-bandwidth, low cost permanent paths and high-bandwidth, high cost, switched paths.
It is desirable to provide a method and system having fast search capabilities through use of a TCAM for classifying a plurality of types of data traffic and route lookup.
SUMMARY OF THE INVENTION
The present invention relates to a method and system for supporting a plurality of data flows in a router using a ternary content addressable memory (TCAM) in which the number of accesses to the TCAM is optimized to improve efficiency of updating and subsequent look up. To accommodate the plurality of data flows, the TCAM is partitioned into at least two partitions in which a first portion includes indices having a higher priority and a second portion includes indices having a lower priority. For example, multiple protocol label switching (MPLS) flows and IP-Virtual Private Network (VPN) can be added to the first partition and policy based routing flows can be added to the second partition. During subsequent TCAM look-up of a predetermined prefix of an incoming packet the MPLS or IP-VPN flow will subsume any matching policy based routing flow, such as flows classified by an access control list or traffic manager flows.
In the case of MPLS and IP-VPN flows, flows classified by connection index (CIX) and destination IP address (DA) and flows classified by CIX only are added from the top of the first partition of the TCAM and flows classified by DA only are added from the bottom of the first partition. This arrangement has the advantage that CIX and DA flows and CIX only flows subsume DA only flows at higher indices and CIX and DA flows and CIX only flows are separated from DA only flows to optimize the number of swaps needed when adding a new flow. To reduce the number of writes to the TCAM, a flow index space is used having entries corresponding to the TCAM space. Swaps are performed in the index space and only the changed entries are written to the TCAM.
The invention will be more fully described by reference to the following drawings.
BRIEF DESCRIPTION OF THE DRAWINGS
FIG. 1 is a high-level functional block diagram of a system architecture for classifying flows in a router in accordance with the teachings of the present invention.
FIG. 2 is a schematic diagram of implementation of a flow classifier and flow manager.
FIG. 3 is a schematic diagram of a TCAM flow entry.
FIG. 4A is a schematic diagram of a prefix tree for storing flows classified by a connection index (CIX).
FIG. 4B is a schematic diagram of a prefix tree for storing flows classified by a destination address (DA).
FIG. 5A is a schematic diagram of data organization of a flow TCAM for MPLS and IP-VPN flows classified by CIX and DA before addition of the flow when no DA flow is present.
FIG. 5B is a schematic diagram of data organization of a flow TCAM for MPLS and IP-VPN flows classified by CIX and DA after addition of the flow when no DA flow is present.
FIG. 5C is a schematic diagram of data organization of a flow TCAM for MPLS and IP-VPN flows classified by CIX and DA before addition of the flow when DA flow is present.
FIG. 5D is a schematic diagram of data organization of a flow TCAM for MPLS and IP-VPN flows classified by CIX and DA after addition of the flow when DA flow is present.
FIG. 6A is a schematic diagram of data organization of a flow TCAM for MPLS and IP-VPN flows classified by DA before addition of the flow when no CIX, DA or CIX flows are present.
FIG. 6B is a schematic diagram of data organization of a flow TCAM for MPLS and IP-VPN flows classified by DA after addition of the flow when no CIX, DA or CIX flows are present.
FIG. 6C is a schematic diagram of data organization of a flow TCAM for MPLS and IP-VPN flows classified by DA before addition of the flow when CIX, DA or CIX flows are present.
FIG. 6D is a schematic diagram of data organization of a flow TCAM for MPLS and IP-VPN flows classified by DA after addition of the flow when CIX, DA or CIX flows are present.
FIG. 7 is a schematic diagram of data organization of a flow TCAM for policy based routing flows.
DETAILED DESCRIPTION
Reference will now be made in greater detail to a preferred embodiment of the invention, an example of which is illustrated in the accompanying drawings. Wherever possible, the same reference numerals will be used throughout the drawings and the description to refer to the same or like parts.
Referring to FIG. 1 there is shown a high-level functional block diagram of the system architecture for classifying and routing flows in a router 10 in accordance with the teachings of the present invention. A flow is a set of data packets that obey a rule or policy identified from the content of the packet header fields of the data packets. The packet header fields can include for example the source IP address, destination IP address, source port, destination port, protocol identification, type of service (TOS), connection index (CIX) and other fields. The architecture comprises three major elements, control plane 12, data plane 13 and layer 2 interface 14. The interaction between the various elements is represented by the series of arrows between corresponding elements. Control plane 12 which can be implemented in software is comprised of flow manager 15, data plane control interface 16, flow core control 17 and IP, User Datagram Protocol (“UDP”) and Transmission Control Protocol (“TCP”) 18. Data plane 13 which can be implemented in hardware is comprised of flow classifier 20, IP forwarder 21 and label forwarder 22. IP traffic and IP control traffic 23 is received at flow classifier 20. Flow classifier 20 interacts with flow manager 15 and flow core control 17 for classifying and routing IP traffic and IP control traffic 23 and applying destination routes through label forwarder 22, in the case of MPLS flows, or IP forwarder 21 in the case of non-MPLS flows. Flow core control 17 can comprise software modules such as, for example, TEP, red manager, label manager, route watch, routing manager and FIB and an IP routing data base. While the present invention is particularly well suited for use with the AmberNetwork ASR 2000 and ASR 2020 devices as described herein, it is equally suited for use with other routers having similar capabilities and features. The AmberNetwork ASR 2000 and ASR 2020 technical manuals are incorporated herein by reference as if fully set out.
FIG. 2 is a schematic diagram of an example implementation of flow classifier 20 and flow manager 15. In this embodiment, flow classifier 20 comprises flow ternary content addressable memory (TCAM) 30. Flow TCAM 30 is a hardware memory device where all entries in the TCAM are compared in parallel against incoming packet header fields and the first matching entry is selected in a single clock cycle. A suitable TCAM is manufactured by Lara Technology Inc., San Jose, Calif. and as described in U.S. Pat. No. 6,081,440 hereby incorporated by reference into this application. Each flow TCAM 30 entry is addressed or indexed by indices 32. Indices 32 can be an index or numerical address. Indices 32 are arranged from lowest index 32 a to highest index 32 n with priority being greatest at lowest index 32 a and being least at highest index 32 n.
FIG. 3 illustrates a representative TCAM flow entry 33 to be stored in flow TCAM 30. A local mask 34 is associated with each TCAM flow entry 33 for effectively storing in flow TCAM 30 either a logic 0, a logic 1, or a don't care for a flow TCAM look up operation. For example, if a bit of local mask 34 is a logic 1, the corresponding bit of TCAM flow entry 33 is compared to a corresponding bit of an incoming data packet during a subsequent flow TCAM look up operation. Conversely, if local mask 34 is a logic 0, the corresponding bit of TCAM flow entry 33 is not compared during a subsequent flow TCAM look up operation. Alternatively, in other embodiments of the present invention the mask bit scheme can be inverted such that a mask bit is equal to logic 1, the corresponding bit of the TCAM flow entry is masked and if a mask bit is equal to a logic 0 the corresponding bit of the TCAM flow entry is compared. A prefix can be associated with one or more of the fields in flow TCAM entry 33, such as the destination IP address, to indicate the number of bits of the destination IP address of the packet header to be matched in flow TCAM 30. In a subsequent flow TCAM look up operation, if there is a match between the unmasked flow TCAM entry and the predetermined prefix corresponding to the incoming packet header bits, the index of the matching TCAM flow entry 33 as well as any routing data stored in flow TCAM 30 or in an associated external memory such as for instance, an SRAM, is provided as output.
Flow manager 15 is used to provide data structure organization of flow TCAM 30. Referring to FIG. 2, flow manager 15 can partition indices 32 into one or more logical partitions. Flows are assigned to partitions depending on a desired priority for the type of flow. In this embodiment, indices 32 are partitioned into partition 36 a which partition includes lowest index 32 a and partition 36 b which partition includes highest index 32 n. A FTCAM_Partition index is located between partition 36 a and partition 36 b. In the embodiment shown in FIG. 2, MPLS and IP-VPN flows are determined to have the highest priority and are assigned to partition 36 a. Policy-based routing flows are determined to have lower priority and are assigned to partition 36 b. Policy based routing flows can include data classified by Access Control Lists (ACL) flows and traffic manager (TE) flows. Accordingly, MPLS flows and IP-VPN flows which have been assigned higher priority will be found in a subsequent lookup in flow TCAM 30 before ACL flows and TE flows which have been assigned a lower priority and MPLS flows or P VPN flows will subsume any matching ACL flows and TE flows in flow TCAM 30.
Flow index space 38 can be maintained in flow manager 15 to correspond to data organization of flow TCAM 30. All flow swapping can be performed in flow index space 38 and only the changed entries are written to the flow TCAM 30.
In an embodiment of the present invention, an array of pointers and prefix trees are used to store MPLS and IP-VPN flows in flow index space 38, as shown in FIGS. 4A and 4B. Flows which are classified by connection index CIX and destination IP address (DA) fields of the packet header, are stored in CIX prefix tree 40. Each connection index (CIX1–CIX16K) is associated with node 41 a41 n of prefix tree 40. A destination IP address based lookup is performed to find the longest match of a prefix stored in a respective node 41 a41 n. Flows are maintained in order to match the correct flow during flow TCAM 30 look up. A variable gMaxCixDaFix is used in flow index space 38 to indicate the maximum flow TCAM Index of the CIX and DA flows and CIX only flows. Flows which are classified by destination IP address only are stored in DA prefix tree 42. Each DA is associated with node 44 of prefix tree 42.
A variable gMinDaOnlyFix is used in flow index space 38 to indicate the minimum flow TCAM index for DA only flows
A software module can be implemented in flow manager 15 for MPLS and IP-VPN flow organization of TCAM 30. A representative software module is illustrated in Table 1.
TABLE 1
typedef struct_flowlkuptabentry
{
FM_PR_TREE *pfTreePtr;
} FM_FLOWLKUP_TABLE_ENTRY;
typedef struct _lookuptable
{
FM_FLOWLKUP_TABLE_ENTRY
flowLkupTable[FM_MAX_CIX];
}FM_FLOWLKUP_TABLE;
typedef struct _fmprtreenode
{
PR_NODE  prNode;   /* PR_NODE contains
RB_NODE + prefix and mask */
FM_FLOW  flowObject;
}FM_PR_NODE;
typedef struct _fmprefixtree
{
PR_TREE   prTree; /* root of prefix tree */
} FM_PR_TREE;
FIGS. 5A–5D illustrate an example of data organization of flow TCAM 30 for MPLS and IP-VPN flows. Flows are maintained in order to match the correct flow during flow TCAM 30 look up. Partition 36 a is divided into lower index portion 50 a and higher index portion 50 b. Lower index portion 50 a corresponds to a lower index or address range and higher index portion 50 b corresponds to a higher index or address range. Flows which are to be classified by the connection index (CIX) and Destination IP Address (DA) fields of the packet header, referred to as CIX, DA, are assigned to lower index portion 50 a. Flows which are classified only by the CIX of the packet header are also assigned to lower index portion 50 a. Flows which are classified only by the DA of the packet header are assigned to higher index portion 50 b. Local mask 34 can be applied to each flow TCAM entry 33 to effectively store the particular type of data flows, such as the above-described CIX, DA flows, CIX only flows and DA only flows, for use in compare operations of flow TCAM 30. For example, CIX only flows can occur when local mask bits of the DA are zero and local mask bits of the CIX are all one.
During adding of flows classified by CIX, DA or CIX only to TCAM 30, a free entry in TCAM 30 is searched from lowest index 32 a of lower index portion 50 a. The free entry is referred to as Fix. During adding of flows classified as DA flows, a free entry in TCAM 30 is searched from highest index 32 b of highest index portion 50 b. An index corresponding to a maximum value of lowest index portion 50 a is established as gMaxCixDaFix and an index corresponding to minimum value of a highest index portion 50 b is established as gMinDaOnlyFix. In this manner, maximum free space 54 is achieved between lower index portion 50 a and higher index portion 50 b, thereby maintaining the CIX, DA flows and CIX only flows together and the DA only flows together and separately the CIX, DA flows and CIX only flows from the DA flows. During deletion of flows classified by CIX, DA or CIX only from TCAM 30, the entry at a corresponding index 32 is invalidated in flow space 38. Thereafter, during subsequent adding of flows classified by CIX, DA or CIX only, the invalidated entry is found during a search for free entries from lowest index 32 a of lower index portion 50 a the flow is added to re-use the previously invalidated entry. Accordingly, only if TCAM 30 is substantially at capacity will it be necessary to swap a DA only flow to insert a CIX, DA or CIX only flow or to swap a CIX, DA flow or CIX only flow to insert a DA only flow.
FIGS. 5A–5B illustrate assignment of CIX, DA flows and CIX only flows if no DA only flows exist or a free TCAM entry, Fix, is above the DA only flows at a lower index value than gMinDaOnlyFix. The gMaxCixDaFix index entry is set immediately after the index corresponding to Fix. FIGS. 5C–5D illustrate assignment of CIX, DA and CIX only flows if there are DA only flows present or a free TCAM entry, Fix, is between the DA only flows. In this embodiment, TCAM 30 is almost full. There exists no free entries from lowest index 32 a past gMaxCixDaFix and gMinDaOnlyFix indices. Accordingly, the gMaxCixDaFix and gMinDaOnlyFix indices are adjacent indices. A free entry is available between the index of gMinDaOnlyFix and highest index 32 b. For example, the free entry can occur in the Da flow space because of an earlier deletion of a DA flow. In order to use the free entry, Fix, for a flow classified by CIX, DA or CIX only, the DA flow at the gMinDaOnlyFix index is moved into Fix, thereby making the gMinDaOnly Fix index available. The flow classified by CIX, DA or CIX only is written at the current index for gMinDaOnlyFix. The gMaxCixDaFix index is set at the written TCAM entry for the flow classified by CIX, DA or CIX only and the gMinDaOnlyFix entry is set immediately after the written TCAM entry. The other CIX, DA and CIX only flows between lowest index 32 a and the gMaxCixDaOnlyFix index in TCAM 30 are adjusted for proper subsuming ordering. The other DA only flows between the gMinDaOnlyFix index and highest index 32 b are adjusted for proper subsuming ordering.
A software module can be implemented in flow manager 15 for adding CIX, DA flows and CIX only flows to TCAM 30. A pointer to the current flow is referred to as pflow. A pointer to the free entry is referred to as fix. The TCAM flow entry 33 is written to flow TCAM 30 by an AdjustAndWriteCixDA(pflow, fix) function, described below in order to adjust the writing at TCAM flow entry 33 into flow TCAM 30 based on local mask 34 of other DAs in the same CIX. A representative software module is illustrated in Table 2.
TABLE 2
1. Begin insertCixDaFlow (pFlow)
2. Starting at top of TCAM partition, searching downwards, find first
free FTCAM entry, say ‘Fix’.
3. if ((gMinDaOnlyFix == 0) || (Fix < gMinDaOnlyFix))
{ /* No <DA> only flows are present */
/* Or <DA> only flows exist, but Fix is above them */
AdjustAndWriteCixDA (pFlow, Fix) /* take care of subsuming
issues with other DAs in same Cix, based on subnet masks */
Set gMaxCixDaFix
return
}
else
{
/* There are DA Only flows present */
/* Free flow is in between the <DA> only flows */
/* Get Flow currently at gMinDaOnlyFix */
pOtherFlow = GetFlowAtIndex (gMinDaOnlyFlow);
AdjustAndWriteDA (pOtherFlow, Fix);
/* Write Flow to be added at gMinDaOnlyFix */
AdjustAndWriteCixDA (pFlow, gMinDaOnlyFix);
set gMaxCixDaFix
set gMinDaOnlyFix
Return
}
4. End of insertCixDaFlow
During inserting of CIX, DA flows, CIX only flow and DA only flows the flows in flow TCAM 30 are adjusted such that flow TCAM 30 is ordered to have the TCAM entry with the longest prefix located at the index having highest priority which is the lowest index or lowest numerical value and the TCAM entry followed by decreasing prefix values with the shortest prefix is located at the index having lowest priority which is the highest index or highest numerical value. Tables 3 and 4 illustrate respective software modules which can be implemented in flow manager 15 for adjusting and writing DA only flows and adjusting and writing Fix and DA flows and which modules are used in the software module illustrated in Table 1.
TABLE 3
1. Begin AdjustAndWriteDA(pFlow).
2. Using the mask length of the destination IP address in the flow, first
fix the shorter-prefix flow in prefix tree 42. If a shorter prefix node is
found in the <DA> only prefix tree 42, and the index of the found
node is less than the index of the pFlow node, swap the two flows
and write only the second flow to flow TCAM 30. Then continue
search with the removed flow to locate routes that are subsumed.
3. Write the last best flow into its correct location and remember this so
that it doesn't have to be re-written again below.
4. At this point pFlow is pointing to the shortest-prefix flow whose
index had to be adjusted to follow a largest prefix match (LPM)
property and that matched the original flow that had to be inserted in
flow TCAM 30.
5. Fix the longer-prefix flows in TCAM 30. Starting from mask length
32 and going downwards to current mask length, find largest flow
index flow that gets subsumed.
6. If the found flows flow index is greater than the index of current
flow, it means that a flow with a longer prefix to the same destination
is before the current one which has a shorter prefix. In this case swap
the two flows in TCAM 30 and fix the index values in the flows.
Write the second flow to TCAM 30.
7. Write the last best flow into its correct location. If this is same flow
as that already written in step 3 above, TCAM 30 is not written again.
8. End of AdjustAndWriteDA(pFlow).
TABLE 4
1. Begin adjustAndWriteCixDA (pFlow, Fix)
2. Using the mask length of the destination IP address in the flow, first
fix the shorter-prefix flow in prefix tree 40. If a shorter prefix node
is found and the index of the found node is less than the index of the
pFlow node, swap the two flows and write only the second flow to
flow TCAM 30. Then continue search with the removed flow to
locate routes that are subsumed.
3. Write the last best flow into its correct location and remember this so
that it doesn't have to be re-written again below.
4. At this point pFlow is pointing to the shortest-prefix flow whose
index had to be adjusted to follow LPM property and that matched
the original flow that had to be inserted in flow TCAM 30.
5. Fix the longer-prefix flows in TCAM 30. Starting from mask length
32 and going downwards to current mask length, find largest flow
index flow that gets subsumed.
6. If the found flows flow index is greater than the index of current
flow, it means that a flow with a longer prefix to the same destination
is before the current one which has a shorter prefix. In this case swap
the two flows in the TCAM 30 and fix the index values in the flows.
Write the second flow to TCAM 30.
7. Write the last best flow into its correct location. If this is same flow
as that already written in step 3 above, TCAM 30 is not written
again.
8. End of AdjustAndWriteCIXDA(pFlow, Fix).
FIGS. 6A–6B illustrate assignment of DA only flows if the first free TCAM entry, Fix, is located after both CIX, DA flows and CIX only flows or if there are no CIX, DA flows. The gMinDaOnlyFix index entry is set at the index corresponding to Fix. FIGS. 6C–6D illustrate assignment of DA flows if the first free TCAM entry, Fix, is between CIX, DA or CIX only flows. In this embodiment, TCAM 30 is almost full. There exists no free entries from highest index 32 b past gMinDaOnlyFix and gMaxCixDaFix. Accordingly, the gMaxCixDaFix and gMinDaOnlyFix indices are adjacent indices. A free entry is available between the index of gMaxCixDaFix and lowest index 32 a. For example, the free entry can occur in CIX, DA and CIX only flow space because of an earlier deletion of a CIX, DA or CIX only flow. In order to use the free entry, Fix, for a flow classified by DA only, the CIX, DA or CIX only flow at the gMaxCixDaFix index is moved into Fix, thereby making the gMaxCixDaFix index available. The flow classified by DA is written at the current index for gMaxCixDaFix. The gMinDaOnlyFix entry is set at the written TCAM entry and the gMaxCixDaFix entry is set immediately before the written TCAM entry. The other DA flows between highest index 32 b and the gMinDaOnlyFix index are adjusted for proper subsuming ordering. The other CIX, DA and CIX only flows between gMaxCixDaFix and lowest index 32 a are adjusted for proper subsuming ordering.
A software module can be implemented in flow manager 15 for adding DA flows to TCAM 30. A representative software module is illustrated in Table 5.
TABLE 5
1. Begin insertDaOnlyFlow(pFlow).
2. Starting at the bottom of the TCAM partition, searching upwards,
find the first free FTCAM entry, say at index ‘Fix’.
If failed (TCAM partition is already full), return −1.
3. if (Fix > gMaxCixDaFix)
{ /* Flow index is located after both <Cix, DA> and
<Cix> only flows in the TCAM*/
/* OR gMaxCixDaFix = 0, i.e. there are no
<Cix, DA> flows yet */
AdjustAndWriteCixDA (pFlow, Fix) /* take care of
subsuming issues with other DAs in same Cix, based
on subnet masks */
Set gMaxCixDaFix
return
}
else
{
/*Fix lies in between <Cix, Da> flows*/
/*Get flow currently at gMaxCixDaFix at flowIndex */
pOtherFlow = GetFlowAtIndex(gMaxCixDaFix);
AdjustAndWriteCixDA (pOtherFlow, Fix) /*take care of
subsuming issues with other DAs in same Cix, based on
subnet masks */
/*Write flow to be added at gMaxCixDaFix */
AdjustAndWriteDA (pFlow, gMaxCixOnlyFix)
Set gMinDaOnlyFix
Set gMaxCixDaFix
Return
}
4. End of insertDaOnlyFlow
The clients of flow manager 15 are responsible for removing flows in TCAM 30 if an interface goes down. Flow manager 15 provides an Application Programming Interface (APIs) to withdraw routes based on the application handle. For example, if an IP circuit goes down the connection manager informs the IP task and the VPN manager receives this alarm. The VPN manager in turn withdraws the routes from flow TCAM 30 based on the circuit identifiers.
A software module can be implemented in flow manager 15 for removing flows in TCAM 30. A representative software module is illustrated in Table 6.
TABLE 6
1. Check that the flowId is within limits.
2. Get Flow corresponding to flowId: pFlow = GetFlowAtIndex(flowId)
3. Find the node in the correct tree. If pFlow has Cix, search prefix tree
40 for this Cix, else search prefix tree 42.
4. Remove found node, adjust respective tree and free up the node
memory.
5. Free up Flow Space index entry.
6. if flowId == gMaxCixDaFix or gMinDaOnlyFix, modify these
variables. If flow at gMaxCixDaFix index is being removed, reduce
gMaxCixDaFix until it becomes the index of a valid <Cix,DA> or
<Cix> only flow. If flow at gMinDaOnlyFixindex is being removed,
increase gMinDaOnlyFix until it becomes the index of a valid <DA>
only flow.
7. Free up the flow memory and invalidate the flow in TCAM 30.
ACL flows and traffic manager (TE) flows are internally stored in a flow index space corresponding to the Flow TCAM by the Flow Manager 15, as shown in FIG. 7. The ACL flows and TE flows are strictly ordered based on the command line interface (CLI) defined access control lists (ACLs). ACLs are typically applied to network interfaces to permit or deny certain kinds of network traffic. All packets matching a particular ACL flow will be allowed to pass through and a network route is determined. All packets not matching the ACL flow will be dropped or a policing or shaping of type of service (“TOS”) operation will be performed on the packets. A global access-list is used at all interfaces.
The ACL and TE flows are maintained in order when added to flow TCAM 30. Flows are added to the next available index entry located in flow TCAM 30 starting from top 60 of partition 36 b. Partition 36 b is further subdivided into portions 62 a and 62 b. Portion 62 a is used for ACLs applied to interfaces and portion 62 b is used for global ACLs which will be used if no other ACL matches. A GACL_PARTITION variable can be used to define the partition size of portion 62 a and 62 b. A gMaxACLFix variable defines a maximum flow TCAM index for ACL and TE flows in portion 62 a. A gGlobalACLFix variable defines a maximum flow TCAM index for Global ACL & TE flows in portion 62 b.
Policy based ACL and TE flows are added at the location of the gMaxACLFix variable and the gMaxACLFix variable is incremented. If gMaxACLFix becomes equal to the GACL_PARTITION variable, portion 62 b is full and no more ACL flows can be added until some flows are deleted. An ACL flow can specify a range of source or destination ports. The ACL flow that specifies a range of source or destination ports is mapped to multiple flows, with a local mask 34 to cover a portion of the range. Accordingly, the optimal number of flows with different masks are determined to cover the specified range. For the flows which map to multiple flows in the TCAM, an application programming interface (API) can create peer flows with an assigned local mask 34 and add the peer flows along with the parent flow to flow TCAM 30 which flows can be managed by flow manager 15.
Global ACL flows are added at gGlobalACLFix variable and then the gGlobalACLFix variable is incremented. If the gGlobalACLFix variable becomes equal to a FM_MAX_FIX variable, then no more Global ACL flows can be added until some flows are deleted from TCAM 30.
Flow manager 15 includes software modules which are responsible for removing flows from TCAM 30. For single flow deletion, the flow will be removed from flow index space 38 and is invalidated in flow TCAM 30. First API 66 is used to delete a single flow from TCAM 30. If the single flow has peer flows all of the peers will also be deleted. Flows remaining in flow TCAM 30 are compacted immediately in order to fill up the vacant flow space. All flows after the deleted flow are moved up by one index and are written to TCAM 30. The value of the gMaxACLFix variable is adjusted accordingly.
For multiple flow deletion, all flows in the supplied flow list will be removed and then compaction will be performed on remaining flows. A second API 67 is used to delete a list of flows for deleting multiple flows from TCAM 30. The first empty flow space is filled first by the next available occupied flow and this is repeated until all flows are compacted such that all empty flow spaces before the gMaxACLFix variable are filled up. The value of the gMaxACLFix variable is adjusted accordingly.
In view of the foregoing description, numerous modifications and alternative embodiments of the invention will be apparent to those skilled in the art. It should be clearly understood that the particular exemplary computer code can be implemented in a variety of ways in a variety of languages, which are equally well suited for a variety of hardware platforms.
It is to be understood that the above-described embodiments are illustrative of only a few of the many possible specific embodiments which can represent applications of the principles of the invention. Numerous and varied other arrangements can be readily devised in accordance with these principles by those skilled in the art without departing from the spirit and scope of the invention.

Claims (67)

1. A method for classifying a plurality of data flows in a router comprising the steps of:
partitioning a ternary content addressable memory (TCAM) into at least a first partition and a second partition; said first partition includes indices having highest priority ranging from a lowest index to a partition index and said second partition includes indices having lowest priority ranging from a highest index to said partition index;
loading one or more first flow TCAM entries of a first of said plurality of data flows into said first partition in a predetermined order;
loading one or more second flow TCAM entries of a second of said plurality of data flows into said second partition in a predetermined order;
setting bit values of a corresponding mask for each of said first TCAM entries and said second TCAM entries such that bits of said respective first TCAM entries and said second TCAM entries are individually masked by said masks; and
comparing a prefix comprising predetermined packet header information of an incoming packet to said loaded one or more first TCAM entries and one or more second TCAM entries such that a matching said one or more first TCAM entries subsumes any matching said one or more second TCAM entries.
2. The method of claim 1 where said first plurality of data flows are MPLS or IPVPN flows.
3. The method of claim 1 wherein said second plurality of data flows are policy based routing flows.
4. The method of claim 3 wherein said policy based routing flows are access control list (ACL) flows.
5. The method of claim 3 wherein said policy based routing flows are traffic manager flows.
6. The method of claim 1 further comprising the steps of: maintaining a flow index space having entries corresponding to said TCAM; and determining said predetermined order of said first TCAM entries and said predetermined order of said second TCAM entries in said flow index space before said steps of loading said one or more first TCAM entries and loading said one or more second TCAM entries.
7. The method of claim 2 wherein said MPLS or IP-VPN flows are classified by connection index (CIX) and destination address (DA), CIX only or DA only.
8. The method of claim 7 wherein said first partition is divided into a first portion and a second portion, said first portion includes indices having highest priority ranging from said lowest index to a gMaxCixDaFix index and said second portion includes indices having lowest priority ranging from a gMinDaOnlyFix index to said partition index and said flows classified by CLX and DA and CIX only are assigned to said first portion and said flows classified by DA only are assigned to said second portion.
9. The method of claim 8 wherein said flows classified by CIX and DA and said flows classified by CIX only are loaded into said first portion starting at said gMaxCixDaFix index and said flows classified by said DA only are loaded in said second portion starting at said gMinDaOnlyFix index.
10. The method of claim 9 wherein said first partition is divided into a first portion and a second portion, said first portion includes indices having highest priority ranging from said lowest index to a gMaxCixDaFix index and said second portion includes indices having lowest priority ranging from a gMinDaOnlyFix index to said partition index, said gMaxCixDaFix index being adjacent to said gMinDaOnlyFix index and a free entry being positioned below said gMinDaOnlyFix index in said second portion and further comprising the steps of:
(a) moving a flow classified by DA only at said gMinDaOnlyFix index to said free entry;
(b) assigning a flow classified by CIX and DA or CIX only to said gMinDaOnlyFix index after step (a);
(c) setting the gMaxCixDaFix index at the index assigned to said flow classified by CIX and DA or CIX only in step (b); and
(d) setting the gMinDaOnlyFix index immediately after the index assigned to said 10 flow classified by CIX and DA or CIX only in step (b).
11. The method of claim 10 further comprising the steps of:
ordering said loaded one or more flows classified by CIX and DA or CIX only which are between said lowest index and said gMaxCixDaOnlyFix index for subsuming ordering; and
ordering said loaded one or more flows classified by DA only which are between said gMinDaOnlyFix index and said partition index for subsuming ordering.
12. The method of claim 9 wherein said first partition is divided into a first portion and a second portion, said first portion includes indices having highest priority ranging from said lowest index to a gMaxCixDaFix index and said second portion includes indices having lowest priority ranging from a gMinDaOnlyFix index to said partition index, said gMaxCixDaFix index being adjacent to said gMinDaOnlyFix index and a free entry being positioned above said gMinDaOnlyFix index in said second portion and further comprising the steps of:
(a) moving a flow classified by CIX and DA or CIX only at said gMaxCixDaFix to said free entry;
(b) assigning a flow classified by DA only to said gMaxCixDaFix index after step (a);
(c) setting the gMinDaOnlyFix index at the index assigned to said flow classified by DA only in step (b); and
(d) setting the gMaxCixDaFix entry immediately before the index assigned to said flow classified by DA only in step (b).
13. The method of claim 12 further comprising the steps of:
ordering said loaded one or more flows classified by DA only which are between said partition index and said gMinDaOnlyFix index for subsuming ordering; and
ordering said loaded one or more flows classified by CLX and DA or CLX only between said gMaxCixDaFix index and said lowest index for subsuming ordering.
14. The method of claim 7 further comprising the steps of: maintaining a flow index space having entries corresponding to said TCAM; and assigning said flows classified by CIX and DA and CIX only to a CIX prefix tree.
15. The method of claim 7 further comprising the steps of:
maintaining a flow index space having entries corresponding to said TCAM; and
assigning said flows classified by DA only to a DA prefix tree.
16. The method of claim 7 further comprising the step of:
removing a flow in said TCAM by freeing up a corresponding said entry in said 20 flow index space and invalidating a corresponding said TCAM entry.
17. The method of claim 1 wherein said predetermined order of said first partition has one of said TCAM entries with a longest prefix located at an index having highest priority followed by decreasing prefix values with a shortest prefix at an index having lowest priority.
18. The method of claim 3 wherein said second partition is divided into a first portion and a second portion, said first portion includes indices having highest priority ranging from a lowest index in said second partition to a GACL-partition index and said second portion includes indices having lowest priority ranging from said GACL-partition index to said highest index, said ACL flows ar global access list flows are assigned to said second portion.
19. The method of claim 18 wherein said ACL flow specifies a range of source or destination ports, and further comprising the step of:
mapping said ACL flow to multiple flows in said TCAM wherein said mask for each of said multiple flows covers a portion of said range of source or destination ports for optimally determining a number of flows to cover said portion of said range.
20. The method of claim 18 further comprising the step of: maintaining a flow index space having entries corresponding to said TCAM.
21. The method of claim 20 further comprising the steps of:
removing a flow in said TCAM by freeing up a corresponding said entry in said 15 flow index space and invalidating a corresponding said TCAM entry; and
compacting said flows in said TCAM by moving each remaining said TCAM entry up by one index.
22. The method of claim 19 further comprising the steps of:
maintaining a flow index space having entries corresponding to said TCAM.
23. The method of claim 22 further comprising the step of:
removing said multiple flows in said TCAM by freeing up corresponding said entries in said flow index space and invalidating said corresponding entries in said TCAM entry; and
compacting said flows in said TCAM by moving each remaining said TCAM entry up by one or more indices.
24. A method for classifying a plurality of data flows in a router comprising the steps of:
partitioning a ternary content addressable memory (TCAM) into at least a first partition and a second partition, said first partition includes indices having highest priority ranging from a lowest index to a partition index and said second partition includes indices having lowest priority ranging from a highest index to said partition index;
loading one or more first flow TCAM entries of a first of said plurality of data flows into said first partition in a predetermined order;
loading one or more second flow TCAM entries of a second of said plurality of data flows into said second partition in a predetermined order;
setting bit values of a corresponding mask for each of said first TCAM entries and said second TCAM entries such that bits of said respective first TCAM entries and said second TCAM entries are individually masked by said masks; and
comparing a prefix comprising predetermined packet header information of an incoming packet to said loaded one or more first TCAM entries and one or more second TCAM entries such that a matching said one or more first TCAM entries subsumes any matching said one or more second TCAM entries,
wherein said first plurality of data flows are MPLS or IP-VPN flows and said second plurality of data flows are policy based routing flows.
25. A method for classifying a plurality of data flows in a router comprising the steps of:
partitioning a ternary content addressable memory (TCAM) into at least a first partition and a second partition, said first partition includes indices having highest priority ranging from a lowest index to a partition index and said second partition
includes indices having lowest priority ranging from a highest index to said partition index;
loading one or more first flow TCAM entries of a first of said plurality of data flows into said first partition in a predetermined order;
loading one or more second flow TCAM entries of a second of said plurality of data flows into said second partition in a predetermined order;
setting bit values of a corresponding mask for each of said first TCAM entries and said second TCAM entries such that bits of said respective first TCAM entries and said second TCAM entries are individually masked by said masks;
comparing a prefix comprising predetermined packet header information of an incoming packet to said loaded one or more first TCAM entries and one or more second TCAM entries such that a matching said one or more first TCAM entries subsumes any matching said one or more second TCAM entries;
maintaining a flow index space having entries corresponding to said TCAM; and
determining said predetermined order of said first TCAM entries and said predetermined order of said second TCAM entries in said flow index space before said steps of loading said one or more first TCAM entries.
26. A system for classifying a plurality of data flows in a router comprising:
means for partitioning a ternary content addressable memory (TCAM) into at least a first partition and a second partition, said first partition includes indices having highest priority ranging from a lowest index to a partition index and said second partition includes indices having lowest priority ranging from a highest index to said partition index;
means for loading one or more first flow TCAM entries of a first of said plurality of data flows into said first partition in a predetermined order;
means for loading one or more second flow TCAM entries of a second of said plurality of data flows into said second partition in a predetermined order;
means for setting bit values of a corresponding mask for each of said first TCAM entries and said second TCAM entries such that bits of said respective first TCAM entries and said second TCAM entries are individually masked by said masks; and
means for comparing a prefix comprising packet header information of in incoming packet to predetermined said loaded one or more first TCAM entries and one or more second TCAM entries,
wherein a matching said one or more first TCAM entries subsumes an matching said one or more second TCAM entries.
27. The system of claim 26 where said first plurality of data flows are MPLS or LP-VPN flows.
28. The system of claim 26 wherein said second plurality of data flows are policy based routing flows.
29. The system of claim 28 wherein said policy based routing flows are access control list (ACL) flows.
30. The system of claim 28 wherein said policy based routing flows are traffic manager flows.
31. The system of claim 26 further comprising:
means for maintaining a flow index space having entries corresponding to said 15 TCAM; and
means for determining said predetermined order of said first TCAM entries and said predetermined order of said second TCAM entries in said flow index space.
32. The system of claim 27 wherein said MPLS or IP-VPN flows are classified by connection index (CLX) and destination address (DA), CIX only or DA only.
33. The system of claim 32 wherein said first partition is divided into a first portion and a second portion, said first portion includes indices having highest priority ranging from said lowest index to a gMaxCixDaFix index and said second portion includes indices having lowest priority ranging from a gMinDaOnlyFix index to said partition index and said flows classified by CLX and DA and CLX only are assigned to said first portion and said flows classified by DA only are assigned to said second portion.
34. The system of claim 33 wherein said flows classified by CIX and DA and said flows classified by CIX only are loaded into said first portion starting at said gMaxCixDaFix index and said flows classified by said DA only are loaded in said second portion starting at said gMinDaOnlyFix index.
35. The system of claim 32 further comprising:
means for maintaining a flow index space having entries corresponding to said TCAM; and assigning said flows classified by CIX and CLX only to a CIX prefix tree.
36. The system of claim 32 wherein said first partition is divided into a first portion and a second portion, said first portion includes indices having highest priority ranging from said lowest index to a gMaxCixDaFix index and said second portion includes indices having lowest priority ranging from a gMinDaOnlyFix index to said partition index, said gMaxCixDaFix index being adjacent to said gMinDaOnlyFix index and a free entry being positioned below said gMinDaOnlyFix index in said second portion and further comprising:
means for moving a flow classified by DA only at said gMinDaOnlyFix index to said free entry;
means for assigning a flow classified by CLX and DA or CLX only to said gMinDaOnlyFix index;
means for setting the gMaxCixDaFix index at the index assigned to said flow 20 classified by CIX and DA or CIX only; and
means for setting the gMinDaOnlyFix index immediately after the index assigned to said flow classified by CIX and DA or CIX only.
37. The system of claim 36 further comprising:
means for ordering said loaded one or more flows classified by CIX and DA or CIX only which are between said lowest index to said gMaxCixDaOnlyFix index for subsuming ordering; and
means for ordering said loaded one or more flows classified by DA only which are between said gMinDaOnlyFix index and said partition index for subsuming ordering.
38. The system of claim 32 wherein said first partition is divided into a first portion and a second portion, said first portion includes indices having highest priority ranging from said lowest index to a gMaxCixDaFix index and said second portion includes indices having lowest priority ranging from a gMinDaOnlyFix index to said partition index, said gMaxCixDaFix index being adjacent to said gMinDaOnlyFix index and a free entry being positioned above said gMinDaOnlyFix index in said second portion and further comprising:
means for moving a flow classified by CIX and DA or CIX only at said gMaxCixDaFix to said free entry;
means for assigning a flow classified by DA only to said gMaxCixDaFix index; means for setting the gMinDaOnlyFix index at the index assigned to said flow classified by DA only; and
means for setting the gMaxCixDaFix entry immediately before the index assigned to said flow classified by DA only.
39. The system of claim 36 wherein said first partition is divided into a first portion and a second portion, said first portion includes indices having highest priority ranging from said lowest index to a gMaxCixDaFix index and said second portion includes indices having lowest priority ranging from a gMinDaOnlyFix index to said partition index, said gMaxCixDaFix index being adjacent to said gMinDaOnlyFix index and a free entry being positioned above said gMinDaOnlyFix index in said second portion and further comprising:
means for moving a flow classified by CIX and DA or CIX only at said gMaxCixDaFix to said free entry;
means for assigning a flow classified by DA only to said gMaxCixDaFix index; means for setting the gMinDaOnlyFix index at the index assigned to said flow classified by DA only; and
means for setting the gMaxCixDaFix entry immediately before the index assigned to said flow classified by DA only.
40. The system of claim 32 further comprising:
means for maintaining a flow index space having entries corresponding to said TCAM; and
means for assigning said flows classified by DA only to a DA prefix tree.
41. The system of claim 40 further comprising:
means for removing a flow in said TCAM by freeing up a corresponding said entry in said flow index space and invalidating a corresponding said TCAM entry.
42. The system of claim 26 wherein said predetermined order of said first partition has one of said TCAM entries with a longest prefix located at an index having highest priority followed by decreasing prefix values with a shortest prefix at an index having lowest priority.
43. The system of claim 28 wherein said second partition is divided into a first is portion and a second portion, said first portion includes indices having highest priority ranging from a lowest index in said second portion to a GACL-partition index and said second portion includes indices having lowest priority ranging from said GACL-partition index to said highest index, said ACL flows are assigned to said first portion and global access list flows are assigned to said second portion.
44. The system of claim 43 wherein said ACL flow specifies a range of source or destination ports, and further comprising:
means for mapping said ACL flow to multiple flows in said TCAM wherein said mask for each of said multiple flows covers a portion of said range of source or destination ports.
45. The system of claim 43 further comprising:
means for maintaining a flow index space having entries corresponding to said TCAM.
46. The system of claim 45 further comprising:
means for removing a flow in said ICAM by freeing up a corresponding said entry in said flow index space and invalidating a corresponding said TCAM entry; and
means for compacting said flows in said TCAM by moving each remaining said TCAM entry up by one or more indices.
47. The system of claim 44 further comprising:
means for maintaining a flow index space having entries corresponding to said TCAM.
48. The system of claim 47 further comprising:
means for removing said multiple flows in said TCAM by freeing up corresponding said entries in said flow index space and invalidating said corresponding entries in said TCAM entry; and means for compacting said flows in said TCAM by moving each remaining said 15 TCAM entry up by one or more indices.
49. A system for classifying a plurality of data flows in a router comprising:
means for partitioning a ternary content addressable memory (TCAM) into at least a first partition and a second partition, said first partition includes indices having highest priority ranging from a lowest index to a partition index and said second partition includes indices having lowest priority ranging from a highest index to said partition index;
means for loading one or more first flow TCAM entries of a first of said plurality of data flows into said first partition in a predetermined order;
means for loading one or more second flow TCAM entries of a second of said plurality of data flows into said second partition in a predetermined order;
means for setting bit values of a corresponding mask for each of said first TCAM entries and said second TCAM entries such that bits of said respective first TCAM entries and said second TCAM entries are individually masked by said masks; and
means for comparing a prefix comprising predetermined packet header information of an incoming packet to said loaded one or more first TCAM entries and one or more second TCAM entries such that a matching said one or more first TCAM entries subsumes any matching said one or more second TCAM entries,
wherein said first plurality of data flows are MPLS or IP-VPN flows and said second plurality of data flows are policy based routing flows.
50. A system for classifying a plurality of data flows in a router comprising:
means for partitioning a ternary content addressable memory (TCAM) into at least a first partition and a second partition, said first partition includes indices having highest priority ranging from a lowest index to a partition index and said second partition includes indices having lowest priority ranging from a highest index to said partition index;
means for loading one or more first flow TCAM entries of a first of said plurality of data flows into said first partition in a predetermined order;
means for loading one or more second flow TCAM entries of a second of said plurality of data flows into said second partition in a predetermined order;
means for setting bit values of a corresponding mask for each of said first TCAM entries and said second TCAM entries such that bits of said respective first TCAM entries and said second TCAM entries are individually masked by said masks;
means for comparing a prefix comprising predetermined packet header information of in incoming packet to said loaded one or more first TCAM entries and one or more second TCAM entries such that a matching said one or more first TCAM entries subsumes an matching said one or more second TCAM entries;
means for maintaining a flow index space having entries corresponding to said TCAM; and
means for determining said predetermined order of said first TCAM entries and said predetermined order of said second TCAM entries in said flow index space before said steps of loading said one or more first TCAM entries.
51. An apparatus for classifying a plurality of data flows in a routing system comprising:
a ternary content addressable memory (TCAM);
a partitioning algorithm for partitioning said TCAM into at least a first partition and a second partition, said first partition includes indices having highest priority ranging from a lowest index to a partition index and said second partition includes indices having lowest priority ranging from a highest index to said partition index;
a loading algorithm for selecting a respective mask value to structure one or more first flow TCAM entries of a first of said data flows and one or more second flow TCAM entries and said respective mask values into said second partition; and
a search algorithm for performing an associative comparison of a prefix comprising predetermined packet header information of an incoming packet to said loaded one or more first flow TCAM entries and one or more second flow TCAM entries of a first of said plurality of data flows into said first partition in a predetermined order such that a matching said one or more first TCAM entries subsumes an matching said one or more second TCAM entries.
52. The apparatus of claim 51 wherein said first plurality of data flows are MPLS or IP-VPN flows.
53. The apparatus of claim 51 wherein said second plurality of data flows are policy based routing flows.
54. The apparatus of claim 51 wherein said partitioning algorithm and said loading algorithm are implemented in flow index space having entries corresponding to said TCAM and said predetermined order of said first TCAM entries and said predetermined order of said second TCAM entries is represented in said flow index space.
55. The apparatus of claim 52 wherein said MPLS or IP-VPN flows are classified by connection index (CIX) and destination address (DA), CIX only or DA only.
56. The apparatus of claim 55 wherein said first partition is divided into a first portion and a second portion, said first portion includes indices having highest priority ranging from said lowest index to a gMaxCixDaFix index and said second portion includes indices having lowest priority ranging from a gMinDaOnlyFix index to said partition index and said flows classified by CIX and DA and CIX only are assigned to said first portion and said flows classified by DA only are assigned to said second portion.
57. The apparatus of claim 56 wherein said flows classified by CIX and DA and flows classified by CIX only are loaded into said first portion starting at a beginning of said TCAM and ending at said gMaxCixDaFix index and said flows classified by said DA only are loaded in said second portion starting at said gMinDaOnlyFix index.
58. The apparatus of claim 52 further comprising:
means for maintaining a flow index space having entries corresponding to said TCAM; and means for assigning said flows classified by CIX to a CIX prefix tree.
59. The apparatus of claim 52 further comprising:
means for maintaining a flow index space having entries corresponding to said TCAM; and means for assigning said flows classified by DA only to a DA prefix tree.
60. The apparatus of claim 59 further comprising:
means for removing a flow in said TCAM by freeing up a corresponding said entry in said flow index space and invalidating a corresponding said TCAM entry.
61. The apparatus of claim 52 wherein said predetermined order of said first partition has one of said TCAM entries with a longest prefix located at an index having highest priority followed by decreasing prefix values with a shortest prefix at an index having lowest priority.
62. The apparatus of claim 53 wherein said second partition is divided into a first portion and a second portion, said first portion includes indices having highest priority ranging from a lowest index in said second partition to a GACL-partition index and said second portion includes indices having lowest priority ranging from said GACL-partition index to said highest index in said second partition, said ACL flows are assigned to said first portion and global access list flows are assigned to said second portion.
63. The apparatus of claim 62 wherein said ACL flow specifies a range of source or destination ports, and further comprising:
means for mapping said ACL flow to multiple flows in said TCAM wherein said mask for each of said multiple flows covers a portion of said range of source or destination ports.
64. The apparatus of claim 62 further comprising:
means for maintaining a flow index space having entries corresponding to said TCAM.
65. The apparatus of claim 64 further comprising:
means for removing a flow in said TCAM by freeing up a corresponding said 20 entry in said flow index space and invalidating a corresponding said TCAM entry; and
means for compacting said flows in said TCAM by moving each remaining said TCAM entry up by one index.
66. The apparatus of claim 62 further comprising:
means for maintaining a flow index space having entries corresponding to said TCAM.
67. The apparatus of claim 62 further comprising:
means for removing said multiple flows in said TCAM by freeing up 30 corresponding said entries in said flow index space and invalidating said corresponding entries in said TCAM entry; and
means for compacting said flows in said TCAM by moving each remaining said TCAM entry up by one or more indices.
US09/909,739 2001-07-20 2001-07-20 Selective routing of data flows using a TCAM Expired - Lifetime US7028098B2 (en)

Priority Applications (6)

Application Number Priority Date Filing Date Title
US09/909,739 US7028098B2 (en) 2001-07-20 2001-07-20 Selective routing of data flows using a TCAM
CNB028024532A CN1282104C (en) 2001-07-20 2002-07-03 Selective routing of data flows using a tcam
EP02748075A EP1352334A4 (en) 2001-07-20 2002-07-03 Selective routing of data flows using a tcam
PCT/US2002/021229 WO2003012672A2 (en) 2001-07-20 2002-07-03 Selective routing of data flows using a tcam
CA002422439A CA2422439A1 (en) 2001-07-20 2002-07-03 Selective routing of data flows using a tcam
JP2003517777A JP3800546B2 (en) 2001-07-20 2002-07-03 Method for selectively routing data flows using TCAM

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
US09/909,739 US7028098B2 (en) 2001-07-20 2001-07-20 Selective routing of data flows using a TCAM

Publications (2)

Publication Number Publication Date
US20030056001A1 US20030056001A1 (en) 2003-03-20
US7028098B2 true US7028098B2 (en) 2006-04-11

Family

ID=25427747

Family Applications (1)

Application Number Title Priority Date Filing Date
US09/909,739 Expired - Lifetime US7028098B2 (en) 2001-07-20 2001-07-20 Selective routing of data flows using a TCAM

Country Status (6)

Country Link
US (1) US7028098B2 (en)
EP (1) EP1352334A4 (en)
JP (1) JP3800546B2 (en)
CN (1) CN1282104C (en)
CA (1) CA2422439A1 (en)
WO (1) WO2003012672A2 (en)

Cited By (43)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20030189932A1 (en) * 2002-04-08 2003-10-09 Hitachi, Ltd. Device for flow classifying and packet forwarding device with flow classify function
US20040255154A1 (en) * 2003-06-11 2004-12-16 Foundry Networks, Inc. Multiple tiered network security system, method and apparatus
US20040260707A1 (en) * 2001-06-21 2004-12-23 Qiuyuan Yang Configuration and management system and implementation method of multi-protocol label switching VPN
US20050025125A1 (en) * 2003-08-01 2005-02-03 Foundry Networks, Inc. System, method and apparatus for providing multiple access modes in a data communications network
US20050055570A1 (en) * 2003-09-04 2005-03-10 Foundry Networks, Inc. Multiple tiered network security system, method and apparatus using dynamic user policy assignment
US20050076138A1 (en) * 2003-10-07 2005-04-07 Alcatel Access control listing mechanism for routers
US20050102428A1 (en) * 2003-11-12 2005-05-12 Heintze Nevin C. Memory management for ternary CAMs and the like
US20050169273A1 (en) * 2004-01-30 2005-08-04 Srinivas Gadde Parallel hardware arrangement for correlating an external transport address pair with a local endpoint association
US20060117126A1 (en) * 2001-07-30 2006-06-01 Cisco Technology, Inc. Processing unit for efficiently determining a packet's destination in a packet-switched network
US7382787B1 (en) 2001-07-30 2008-06-03 Cisco Technology, Inc. Packet routing and switching device
US20080186970A1 (en) * 2007-02-06 2008-08-07 Alcatel Lucent System and method of fast adaptive TCAM sorting for IP longest prefix matching
US7411910B1 (en) * 2004-07-06 2008-08-12 Juniper Networks, Inc. Systems and methods for automatic provisioning of data flows
US20080239956A1 (en) * 2007-03-30 2008-10-02 Packeteer, Inc. Data and Control Plane Architecture for Network Application Traffic Management Device
WO2008121690A2 (en) * 2007-03-30 2008-10-09 Packeteer, Inc. Data and control plane architecture for network application traffic management device
US7450438B1 (en) 2002-06-20 2008-11-11 Cisco Technology, Inc. Crossbar apparatus for a forwarding table memory in a router
US20080316922A1 (en) * 2007-06-21 2008-12-25 Packeteer, Inc. Data and Control Plane Architecture Including Server-Side Triggered Flow Policy Mechanism
US20090003204A1 (en) * 2007-06-29 2009-01-01 Packeteer, Inc. Lockless Bandwidth Management for Multiprocessor Networking Devices
US7496035B1 (en) * 2003-01-31 2009-02-24 Cisco Technology, Inc. Methods and apparatus for defining flow types and instances thereof such as for identifying packets corresponding to instances of the flow types
US20090083517A1 (en) * 2007-09-25 2009-03-26 Packeteer, Inc. Lockless Processing of Command Operations in Multiprocessor Systems
US7516487B1 (en) 2003-05-21 2009-04-07 Foundry Networks, Inc. System and method for source IP anti-spoofing security
US7523485B1 (en) 2003-05-21 2009-04-21 Foundry Networks, Inc. System and method for source IP anti-spoofing security
US7525904B1 (en) 2002-06-20 2009-04-28 Cisco Technology, Inc. Redundant packet routing and switching device and method
US7536476B1 (en) * 2002-12-20 2009-05-19 Cisco Technology, Inc. Method for performing tree based ACL lookups
US20090150603A1 (en) * 2007-12-07 2009-06-11 University Of Florida Research Foundation, Inc. Low power ternary content-addressable memory (tcams) for very large forwarding tables
US20090161547A1 (en) * 2007-12-20 2009-06-25 Packeteer, Inc. Compression Mechanisms for Control Plane-Data Plane Processing Architectures
US20090300759A1 (en) * 2005-12-28 2009-12-03 Foundry Networks, Inc. Attack prevention techniques
US7636937B1 (en) * 2002-01-11 2009-12-22 Cisco Technology, Inc. Method and apparatus for comparing access control lists for configuring a security policy on a network
US7643496B1 (en) 2005-09-30 2010-01-05 Nortel Networks Limited Application specified steering policy implementation
US7710991B1 (en) 2002-06-20 2010-05-04 Cisco Technology, Inc. Scalable packet routing and switching device and method
US7715438B1 (en) 2004-07-06 2010-05-11 Juniper Networks, Inc. Systems and methods for automatic provisioning of data flows
US7774833B1 (en) 2003-09-23 2010-08-10 Foundry Networks, Inc. System and method for protecting CPU against remote access attacks
US20100217936A1 (en) * 2007-02-02 2010-08-26 Jeff Carmichael Systems and methods for processing access control lists (acls) in network switches using regular expression matching logic
US7869442B1 (en) * 2005-09-30 2011-01-11 Nortel Networks Limited Method and apparatus for specifying IP termination in a network element
US7889712B2 (en) 2004-12-23 2011-02-15 Cisco Technology, Inc. Methods and apparatus for providing loop free routing tables
US8205040B1 (en) * 2008-01-29 2012-06-19 Juniper Networks, Inc. Storing content in a ternary content addressable memory
US8528071B1 (en) 2003-12-05 2013-09-03 Foundry Networks, Llc System and method for flexible authentication in a data communications network
US20140089506A1 (en) * 2012-09-26 2014-03-27 Krishna P. Puttaswamy Naga Securing software defined networks via flow deflection
US8874876B2 (en) 2011-03-22 2014-10-28 Texas Instruments Incorporated Method and apparatus for packet switching
US9825865B1 (en) * 2015-03-25 2017-11-21 Cisco Technology, Inc. Statistical operations associated with network traffic forwarding
US10142346B2 (en) 2016-07-28 2018-11-27 Cisco Technology, Inc. Extension of a private cloud end-point group to a public cloud
US10382534B1 (en) 2015-04-04 2019-08-13 Cisco Technology, Inc. Selective load balancing of network traffic
US11263158B2 (en) 2018-02-22 2022-03-01 Pensando Systems Inc. Programmable computer IO device interface
US11489773B2 (en) 2017-11-06 2022-11-01 Pensando Systems Inc. Network system including match processing unit for table-based actions

Families Citing this family (104)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6934795B2 (en) * 1999-09-23 2005-08-23 Netlogic Microsystems, Inc. Content addressable memory with programmable word width and programmable priority
US6944709B2 (en) * 1999-09-23 2005-09-13 Netlogic Microsystems, Inc. Content addressable memory with block-programmable mask write mode, word width and priority
US6912576B1 (en) * 2000-05-04 2005-06-28 Broadcom Corporation System and method of processing data flow in multi-channel, multi-service environment by dynamically allocating a socket
US20030033467A1 (en) * 2001-08-08 2003-02-13 Satoshi Yoshizawa Method and apparatus for resource allocation in network router and switch
US7467227B1 (en) * 2002-12-31 2008-12-16 At&T Corp. System using policy filter decision to map data traffic to virtual networks for forwarding the traffic in a regional access network
US6996664B2 (en) * 2003-01-22 2006-02-07 Micron Technology, Inc. Ternary content addressable memory with enhanced priority matching
WO2004105310A1 (en) * 2003-05-19 2004-12-02 Fujitsu Limited Encrypting device, decrypting device, encrypting method, decrypting method, encrypting program, and decrypting program
US20060007926A1 (en) * 2003-12-19 2006-01-12 Zur Uri E System and method for providing pooling or dynamic allocation of connection context data
CN1697408B (en) * 2004-05-14 2010-04-28 华为技术有限公司 Method for managing routes in virtual private network based on IPv6
CN100426786C (en) * 2004-08-18 2008-10-15 华为技术有限公司 Network access control method based on access control listing
US20060050645A1 (en) * 2004-09-03 2006-03-09 Chappell Christopher L Packet validity checking in switched fabric networks
US7535845B2 (en) * 2004-10-28 2009-05-19 Alcatel Lucent Intelligent selective flow-based datapath architecture
USRE48433E1 (en) 2005-01-27 2021-02-09 The Chamberlain Group, Inc. Method and apparatus to facilitate transmission of an encrypted rolling code
US8422667B2 (en) 2005-01-27 2013-04-16 The Chamberlain Group, Inc. Method and apparatus to facilitate transmission of an encrypted rolling code
US9148409B2 (en) 2005-06-30 2015-09-29 The Chamberlain Group, Inc. Method and apparatus to facilitate message transmission and reception using different transmission characteristics
CN1327674C (en) * 2005-02-25 2007-07-18 清华大学 Double stack compatible router searching device supporting access control listing function on core routers
US20070006294A1 (en) * 2005-06-30 2007-01-04 Hunter G K Secure flow control for a data flow in a computer and data flow in a computer network
US7508829B2 (en) * 2005-11-30 2009-03-24 Cisco Technology, Inc. Method and apparatus providing prioritized recursion resolution of border gateway protocol forwarding information bases
CN100571202C (en) * 2006-01-27 2009-12-16 华为技术有限公司 A kind of transfer approach and transfer system that carries the data of routing iinformation
CN101035061B (en) * 2006-03-09 2010-05-12 中兴通讯股份有限公司 Segmented coded expansion method for realizing the match of the three-folded content addressable memory range
CN100396015C (en) * 2006-03-29 2008-06-18 华为技术有限公司 Method and system for managing TCAM route list
US7760668B1 (en) * 2006-06-20 2010-07-20 Force 10 Networks, Inc. Self-reconfiguring spanning tree
CN100450100C (en) * 2006-08-29 2009-01-07 华为技术有限公司 Route method and equipment
KR100745693B1 (en) * 2006-09-29 2007-08-03 한국전자통신연구원 Method for ternary contents address memory table management
US20080175241A1 (en) * 2007-01-18 2008-07-24 Ut Starcom, Incorporated System and method for obtaining packet forwarding information
CN101090355B (en) * 2007-07-24 2010-09-22 杭州华三通信技术有限公司 Label exchange route setting method, system and equipment of virtual special network channel
CN101222434B (en) * 2008-01-31 2011-04-20 福建星网锐捷网络有限公司 Storage policy control list, policy searching method and tri-state addressing memory
US8581695B2 (en) 2009-05-27 2013-11-12 Grant B. Carlson Channel-switching remote controlled barrier opening system
CN101710873B (en) * 2009-12-08 2012-05-23 中兴通讯股份有限公司 Method and device for managing configuration data
CN101820383B (en) * 2010-01-27 2014-12-10 中兴通讯股份有限公司 Method and device for restricting remote access of switcher
US8345688B2 (en) * 2010-02-23 2013-01-01 Google Inc. System and method for managing flow of packets
WO2011132568A1 (en) * 2010-04-19 2011-10-27 日本電気株式会社 Switch, and flow table control method
CN102122270B (en) * 2011-02-23 2013-08-07 华为技术有限公司 Method and device for searching data in memory and memory
US9736065B2 (en) 2011-06-24 2017-08-15 Cisco Technology, Inc. Level of hierarchy in MST for traffic localization and load balancing
CN102291301B (en) * 2011-08-10 2015-06-10 杭州迪普科技有限公司 Message characteristic matching method and device
US8908698B2 (en) 2012-01-13 2014-12-09 Cisco Technology, Inc. System and method for managing site-to-site VPNs of a cloud managed network
KR101357342B1 (en) * 2012-03-15 2014-02-04 엘에스산전 주식회사 Hardware Protocol Stack
US8775726B2 (en) 2012-07-27 2014-07-08 International Business Machine Corporation TCAM extended search function
US9092469B2 (en) * 2012-08-22 2015-07-28 Empire Technology Development Llc Partitioning sorted data sets
CN103812959B (en) * 2012-11-15 2017-05-31 中国电信股份有限公司 Manage the method and system of IP address concentratedly
US9135997B2 (en) * 2013-01-18 2015-09-15 Fujitsu Limited System and method for filtering addresses
US9043439B2 (en) 2013-03-14 2015-05-26 Cisco Technology, Inc. Method for streaming packet captures from network access devices to a cloud server over HTTP
GB2516837B (en) 2013-07-31 2015-12-09 Ip Access Ltd Network elements, wireless communication system and methods therefor
CN105474181B (en) * 2013-08-31 2018-12-11 英派尔科技开发有限公司 Content Addressable Memory equipment
JP6268943B2 (en) 2013-11-06 2018-01-31 富士通株式会社 Information processing system, switch device, and information processing system control method
CN104954271B (en) * 2014-03-26 2018-11-30 国际商业机器公司 Data package processing method and device in SDN network
US10122605B2 (en) 2014-07-09 2018-11-06 Cisco Technology, Inc Annotation of network activity through different phases of execution
US9825878B2 (en) 2014-09-26 2017-11-21 Cisco Technology, Inc. Distributed application framework for prioritizing network traffic using application priority awareness
CN105743678A (en) * 2014-12-11 2016-07-06 中兴通讯股份有限公司 Method and apparatus for managing table space of ternary content addressable memory (TCAM)
CN105791455B (en) * 2014-12-26 2020-04-07 中兴通讯股份有限公司 Processing method and device for TCAM space
US10050862B2 (en) 2015-02-09 2018-08-14 Cisco Technology, Inc. Distributed application framework that uses network and application awareness for placing data
US10708342B2 (en) 2015-02-27 2020-07-07 Cisco Technology, Inc. Dynamic troubleshooting workspaces for cloud and network management systems
US9853903B1 (en) * 2015-04-23 2017-12-26 Cisco Technology, Inc. Simultaneous redirecting and load balancing
US10476982B2 (en) 2015-05-15 2019-11-12 Cisco Technology, Inc. Multi-datacenter message queue
US10034201B2 (en) 2015-07-09 2018-07-24 Cisco Technology, Inc. Stateless load-balancing across multiple tunnels
JP6582723B2 (en) 2015-08-19 2019-10-02 富士通株式会社 Network system, switch device, and network system control method
US10193809B1 (en) 2015-09-30 2019-01-29 Cisco Technology, Inc. Load balancing methods based on transport layer port numbers for a network switch
US11005682B2 (en) 2015-10-06 2021-05-11 Cisco Technology, Inc. Policy-driven switch overlay bypass in a hybrid cloud network environment
US10462136B2 (en) 2015-10-13 2019-10-29 Cisco Technology, Inc. Hybrid cloud security groups
US10523657B2 (en) 2015-11-16 2019-12-31 Cisco Technology, Inc. Endpoint privacy preservation with cloud conferencing
US10205677B2 (en) 2015-11-24 2019-02-12 Cisco Technology, Inc. Cloud resource placement optimization and migration execution in federated clouds
US10084703B2 (en) 2015-12-04 2018-09-25 Cisco Technology, Inc. Infrastructure-exclusive service forwarding
US10367914B2 (en) 2016-01-12 2019-07-30 Cisco Technology, Inc. Attaching service level agreements to application containers and enabling service assurance
US10129177B2 (en) 2016-05-23 2018-11-13 Cisco Technology, Inc. Inter-cloud broker for hybrid cloud networks
US10659283B2 (en) 2016-07-08 2020-05-19 Cisco Technology, Inc. Reducing ARP/ND flooding in cloud environment
US10432532B2 (en) 2016-07-12 2019-10-01 Cisco Technology, Inc. Dynamically pinning micro-service to uplink port
US10263898B2 (en) 2016-07-20 2019-04-16 Cisco Technology, Inc. System and method for implementing universal cloud classification (UCC) as a service (UCCaaS)
US10382597B2 (en) 2016-07-20 2019-08-13 Cisco Technology, Inc. System and method for transport-layer level identification and isolation of container traffic
US10567344B2 (en) 2016-08-23 2020-02-18 Cisco Technology, Inc. Automatic firewall configuration based on aggregated cloud managed information
US10523592B2 (en) 2016-10-10 2019-12-31 Cisco Technology, Inc. Orchestration system for migrating user data and services based on user information
US11044162B2 (en) 2016-12-06 2021-06-22 Cisco Technology, Inc. Orchestration of cloud and fog interactions
US10848432B2 (en) 2016-12-18 2020-11-24 Cisco Technology, Inc. Switch fabric based load balancing
US10326817B2 (en) 2016-12-20 2019-06-18 Cisco Technology, Inc. System and method for quality-aware recording in large scale collaborate clouds
US10334029B2 (en) 2017-01-10 2019-06-25 Cisco Technology, Inc. Forming neighborhood groups from disperse cloud providers
US10552191B2 (en) 2017-01-26 2020-02-04 Cisco Technology, Inc. Distributed hybrid cloud orchestration model
US10320683B2 (en) 2017-01-30 2019-06-11 Cisco Technology, Inc. Reliable load-balancer using segment routing and real-time application monitoring
US10671571B2 (en) 2017-01-31 2020-06-02 Cisco Technology, Inc. Fast network performance in containerized environments for network function virtualization
JP6446494B2 (en) * 2017-03-23 2018-12-26 エヌ・ティ・ティ・コミュニケーションズ株式会社 Edge node device, resource control method, and program
US11005731B2 (en) 2017-04-05 2021-05-11 Cisco Technology, Inc. Estimating model parameters for automatic deployment of scalable micro services
US10439877B2 (en) 2017-06-26 2019-10-08 Cisco Technology, Inc. Systems and methods for enabling wide area multicast domain name system
US10382274B2 (en) 2017-06-26 2019-08-13 Cisco Technology, Inc. System and method for wide area zero-configuration network auto configuration
US10892940B2 (en) 2017-07-21 2021-01-12 Cisco Technology, Inc. Scalable statistics and analytics mechanisms in cloud networking
US10425288B2 (en) 2017-07-21 2019-09-24 Cisco Technology, Inc. Container telemetry in data center environments with blade servers and switches
US10601693B2 (en) 2017-07-24 2020-03-24 Cisco Technology, Inc. System and method for providing scalable flow monitoring in a data center fabric
US10541866B2 (en) 2017-07-25 2020-01-21 Cisco Technology, Inc. Detecting and resolving multicast traffic performance issues
US11082312B2 (en) 2017-10-04 2021-08-03 Cisco Technology, Inc. Service chaining segmentation analytics
US10965598B1 (en) 2017-10-04 2021-03-30 Cisco Technology, Inc. Load balancing in a service chain
US10965596B2 (en) 2017-10-04 2021-03-30 Cisco Technology, Inc. Hybrid services insertion
US11481362B2 (en) 2017-11-13 2022-10-25 Cisco Technology, Inc. Using persistent memory to enable restartability of bulk load transactions in cloud databases
US10652743B2 (en) 2017-12-21 2020-05-12 The Chamberlain Group, Inc. Security system for a moveable barrier operator
US10705882B2 (en) 2017-12-21 2020-07-07 Cisco Technology, Inc. System and method for resource placement across clouds for data intensive workloads
US11595474B2 (en) 2017-12-28 2023-02-28 Cisco Technology, Inc. Accelerating data replication using multicast and non-volatile memory enabled nodes
US10511534B2 (en) 2018-04-06 2019-12-17 Cisco Technology, Inc. Stateless distributed load-balancing
US10728361B2 (en) 2018-05-29 2020-07-28 Cisco Technology, Inc. System for association of customer information across subscribers
US10904322B2 (en) 2018-06-15 2021-01-26 Cisco Technology, Inc. Systems and methods for scaling down cloud-based servers handling secure connections
US10764266B2 (en) 2018-06-19 2020-09-01 Cisco Technology, Inc. Distributed authentication and authorization for rapid scaling of containerized services
US11019083B2 (en) 2018-06-20 2021-05-25 Cisco Technology, Inc. System for coordinating distributed website analysis
US11074773B1 (en) 2018-06-27 2021-07-27 The Chamberlain Group, Inc. Network-based control of movable barrier operators for autonomous vehicles
US10819571B2 (en) 2018-06-29 2020-10-27 Cisco Technology, Inc. Network traffic optimization using in-situ notification system
US10904342B2 (en) 2018-07-30 2021-01-26 Cisco Technology, Inc. Container networking using communication tunnels
CA3107457A1 (en) 2018-08-01 2020-02-06 The Chamberlain Group, Inc. Movable barrier operator and transmitter pairing over a network
US10997810B2 (en) 2019-05-16 2021-05-04 The Chamberlain Group, Inc. In-vehicle transmitter training
CN113434673B (en) * 2021-06-24 2024-01-19 贝壳找房(北京)科技有限公司 Data processing method, computer readable storage medium, and electronic apparatus
CN113656329B (en) * 2021-08-09 2024-02-02 国家计算机网络与信息安全管理中心 Mask rule insertion method based on TCAM, electronic equipment and storage medium

Citations (23)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5386413A (en) * 1993-03-19 1995-01-31 Bell Communications Research, Inc. Fast multilevel hierarchical routing table lookup using content addressable memory
US5684954A (en) * 1993-03-20 1997-11-04 International Business Machine Corp. Method and apparatus for providing connection identifier by concatenating CAM's addresses at which containing matched protocol information extracted from multiple protocol header
US5841874A (en) * 1996-08-13 1998-11-24 Motorola, Inc. Ternary CAM memory architecture and methodology
US5991300A (en) 1998-09-08 1999-11-23 Cisco Technology, Inc. Technique for efficiently performing optional TTL propagation during label imposition
US6044005A (en) 1999-02-03 2000-03-28 Sibercore Technologies Incorporated Content addressable memory storage device
US6052683A (en) 1998-02-24 2000-04-18 Nortel Networks Corporation Address lookup in packet data communication networks
US6055561A (en) 1996-10-02 2000-04-25 International Business Machines Corporation Mapping of routing traffic to switching networks
US6061712A (en) 1998-01-07 2000-05-09 Lucent Technologies, Inc. Method for IP routing table look-up
US6081440A (en) * 1998-11-05 2000-06-27 Lara Technology, Inc. Ternary content addressable memory (CAM) having fast insertion and deletion of data values
US6137707A (en) * 1999-03-26 2000-10-24 Netlogic Microsystems Method and apparatus for simultaneously performing a plurality of compare operations in content addressable memory device
US6154384A (en) 1999-11-12 2000-11-28 Netlogic Microsystems, Inc. Ternary content addressable memory cell
US6173333B1 (en) * 1997-07-18 2001-01-09 Interprophet Corporation TCP/IP network accelerator system and method which identifies classes of packet traffic for predictable protocols
US6205488B1 (en) 1998-11-13 2001-03-20 Nortel Networks Limited Internet protocol virtual private network realization using multi-protocol label switching tunnels
US6237061B1 (en) * 1999-01-05 2001-05-22 Netlogic Microsystems, Inc. Method for longest prefix matching in a content addressable memory
US6266706B1 (en) * 1997-09-15 2001-07-24 Effnet Group Ab Fast routing lookup system using complete prefix tree, bit vector, and pointers in a routing table for determining where to route IP datagrams
US6295532B1 (en) * 1999-03-02 2001-09-25 Nms Communications Corporation Apparatus and method for classifying information received by a communications system
US6324087B1 (en) * 2000-06-08 2001-11-27 Netlogic Microsystems, Inc. Method and apparatus for partitioning a content addressable memory device
US20020078040A1 (en) * 1999-03-02 2002-06-20 Hawkinson Christopher D. Apparatus and method for providing a binary range tree search
US6502163B1 (en) * 1999-12-17 2002-12-31 Lara Technology, Inc. Method and apparatus for ordering entries in a ternary content addressable memory
US6516383B1 (en) * 2001-05-30 2003-02-04 Cisco Technology, Inc. Techniques for efficient location of free entries for TCAM inserts
US6594704B1 (en) * 1999-12-15 2003-07-15 Quarry Technologies Method of managing and using multiple virtual private networks in a router with a single routing table
US6687785B1 (en) * 2000-06-08 2004-02-03 Netlogic Microsystems, Inc. Method and apparatus for re-assigning priority in a partitioned content addressable memory device
US6763425B1 (en) * 2000-06-08 2004-07-13 Netlogic Microsystems, Inc. Method and apparatus for address translation in a partitioned content addressable memory device

Family Cites Families (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
AU4661793A (en) * 1992-07-02 1994-01-31 Wellfleet Communications Data packet processing method and apparatus
FR2741466B1 (en) * 1995-11-22 1998-01-16 Matra Mhs DEVICE FOR FILTERING INCIDENT MESSAGES IN A COMPUTER NETWORK NODE CONTROLLER
GB2316572B (en) * 1996-08-14 2000-12-20 Fujitsu Ltd Multicasting in switching apparatus
US5920886A (en) * 1997-03-14 1999-07-06 Music Semiconductor Corporation Accelerated hierarchical address filtering and translation using binary and ternary CAMs
US6272131B1 (en) * 1998-06-11 2001-08-07 Synchrodyne Networks, Inc. Integrated data packet network using a common time reference
US6718326B2 (en) * 2000-08-17 2004-04-06 Nippon Telegraph And Telephone Corporation Packet classification search device and method

Patent Citations (23)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5386413A (en) * 1993-03-19 1995-01-31 Bell Communications Research, Inc. Fast multilevel hierarchical routing table lookup using content addressable memory
US5684954A (en) * 1993-03-20 1997-11-04 International Business Machine Corp. Method and apparatus for providing connection identifier by concatenating CAM's addresses at which containing matched protocol information extracted from multiple protocol header
US5841874A (en) * 1996-08-13 1998-11-24 Motorola, Inc. Ternary CAM memory architecture and methodology
US6055561A (en) 1996-10-02 2000-04-25 International Business Machines Corporation Mapping of routing traffic to switching networks
US6173333B1 (en) * 1997-07-18 2001-01-09 Interprophet Corporation TCP/IP network accelerator system and method which identifies classes of packet traffic for predictable protocols
US6266706B1 (en) * 1997-09-15 2001-07-24 Effnet Group Ab Fast routing lookup system using complete prefix tree, bit vector, and pointers in a routing table for determining where to route IP datagrams
US6061712A (en) 1998-01-07 2000-05-09 Lucent Technologies, Inc. Method for IP routing table look-up
US6052683A (en) 1998-02-24 2000-04-18 Nortel Networks Corporation Address lookup in packet data communication networks
US5991300A (en) 1998-09-08 1999-11-23 Cisco Technology, Inc. Technique for efficiently performing optional TTL propagation during label imposition
US6081440A (en) * 1998-11-05 2000-06-27 Lara Technology, Inc. Ternary content addressable memory (CAM) having fast insertion and deletion of data values
US6205488B1 (en) 1998-11-13 2001-03-20 Nortel Networks Limited Internet protocol virtual private network realization using multi-protocol label switching tunnels
US6237061B1 (en) * 1999-01-05 2001-05-22 Netlogic Microsystems, Inc. Method for longest prefix matching in a content addressable memory
US6044005A (en) 1999-02-03 2000-03-28 Sibercore Technologies Incorporated Content addressable memory storage device
US6295532B1 (en) * 1999-03-02 2001-09-25 Nms Communications Corporation Apparatus and method for classifying information received by a communications system
US20020078040A1 (en) * 1999-03-02 2002-06-20 Hawkinson Christopher D. Apparatus and method for providing a binary range tree search
US6137707A (en) * 1999-03-26 2000-10-24 Netlogic Microsystems Method and apparatus for simultaneously performing a plurality of compare operations in content addressable memory device
US6154384A (en) 1999-11-12 2000-11-28 Netlogic Microsystems, Inc. Ternary content addressable memory cell
US6594704B1 (en) * 1999-12-15 2003-07-15 Quarry Technologies Method of managing and using multiple virtual private networks in a router with a single routing table
US6502163B1 (en) * 1999-12-17 2002-12-31 Lara Technology, Inc. Method and apparatus for ordering entries in a ternary content addressable memory
US6324087B1 (en) * 2000-06-08 2001-11-27 Netlogic Microsystems, Inc. Method and apparatus for partitioning a content addressable memory device
US6687785B1 (en) * 2000-06-08 2004-02-03 Netlogic Microsystems, Inc. Method and apparatus for re-assigning priority in a partitioned content addressable memory device
US6763425B1 (en) * 2000-06-08 2004-07-13 Netlogic Microsystems, Inc. Method and apparatus for address translation in a partitioned content addressable memory device
US6516383B1 (en) * 2001-05-30 2003-02-04 Cisco Technology, Inc. Techniques for efficient location of free entries for TCAM inserts

Cited By (86)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20040260707A1 (en) * 2001-06-21 2004-12-23 Qiuyuan Yang Configuration and management system and implementation method of multi-protocol label switching VPN
US7801974B2 (en) * 2001-06-21 2010-09-21 Huawei Technologies Co., Ltd. Configuration and management system and implementation method of multi-protocol label switching VPN
US20060117126A1 (en) * 2001-07-30 2006-06-01 Cisco Technology, Inc. Processing unit for efficiently determining a packet's destination in a packet-switched network
US9094237B2 (en) 2001-07-30 2015-07-28 Cisco Technology, Inc. Packet routing and switching device
US7418536B2 (en) 2001-07-30 2008-08-26 Cisco Technology, Inc. Processor having systolic array pipeline for processing data packets
US7382787B1 (en) 2001-07-30 2008-06-03 Cisco Technology, Inc. Packet routing and switching device
US8270401B1 (en) 2001-07-30 2012-09-18 Cisco Technology, Inc. Packet routing and switching device
US7636937B1 (en) * 2002-01-11 2009-12-22 Cisco Technology, Inc. Method and apparatus for comparing access control lists for configuring a security policy on a network
US20030189932A1 (en) * 2002-04-08 2003-10-09 Hitachi, Ltd. Device for flow classifying and packet forwarding device with flow classify function
US20080037546A1 (en) * 2002-04-08 2008-02-14 Hitachi, Ltd. Device for flow classifying and packet forwarding device with flow classify function
US7286535B2 (en) * 2002-04-08 2007-10-23 Hitachi, Ltd. Device for flow classifying and packet forwarding device with flow classify function
US7773600B2 (en) 2002-04-08 2010-08-10 Hitachi, Ltd. Device for flow classifying and packet forwarding device with flow classify function
US7450438B1 (en) 2002-06-20 2008-11-11 Cisco Technology, Inc. Crossbar apparatus for a forwarding table memory in a router
US7710991B1 (en) 2002-06-20 2010-05-04 Cisco Technology, Inc. Scalable packet routing and switching device and method
US8270399B2 (en) 2002-06-20 2012-09-18 Cisco Technology, Inc. Crossbar apparatus for a forwarding table memory in a router
US7525904B1 (en) 2002-06-20 2009-04-28 Cisco Technology, Inc. Redundant packet routing and switching device and method
US7536476B1 (en) * 2002-12-20 2009-05-19 Cisco Technology, Inc. Method for performing tree based ACL lookups
US7496035B1 (en) * 2003-01-31 2009-02-24 Cisco Technology, Inc. Methods and apparatus for defining flow types and instances thereof such as for identifying packets corresponding to instances of the flow types
US8918875B2 (en) 2003-05-21 2014-12-23 Foundry Networks, Llc System and method for ARP anti-spoofing security
US7516487B1 (en) 2003-05-21 2009-04-07 Foundry Networks, Inc. System and method for source IP anti-spoofing security
US20090260083A1 (en) * 2003-05-21 2009-10-15 Foundry Networks, Inc. System and method for source ip anti-spoofing security
US20090254973A1 (en) * 2003-05-21 2009-10-08 Foundry Networks, Inc. System and method for source ip anti-spoofing security
US8006304B2 (en) 2003-05-21 2011-08-23 Foundry Networks, Llc System and method for ARP anti-spoofing security
US8245300B2 (en) 2003-05-21 2012-08-14 Foundry Networks Llc System and method for ARP anti-spoofing security
US20090307773A1 (en) * 2003-05-21 2009-12-10 Foundry Networks, Inc. System and method for arp anti-spoofing security
US7979903B2 (en) 2003-05-21 2011-07-12 Foundry Networks, Llc System and method for source IP anti-spoofing security
US7523485B1 (en) 2003-05-21 2009-04-21 Foundry Networks, Inc. System and method for source IP anti-spoofing security
US7562390B1 (en) 2003-05-21 2009-07-14 Foundry Networks, Inc. System and method for ARP anti-spoofing security
US8533823B2 (en) 2003-05-21 2013-09-10 Foundry Networks, Llc System and method for source IP anti-spoofing security
US20040255154A1 (en) * 2003-06-11 2004-12-16 Foundry Networks, Inc. Multiple tiered network security system, method and apparatus
US8681800B2 (en) 2003-08-01 2014-03-25 Foundry Networks, Llc System, method and apparatus for providing multiple access modes in a data communications network
US8249096B2 (en) 2003-08-01 2012-08-21 Foundry Networks, Llc System, method and apparatus for providing multiple access modes in a data communications network
US20050025125A1 (en) * 2003-08-01 2005-02-03 Foundry Networks, Inc. System, method and apparatus for providing multiple access modes in a data communications network
US20100325700A1 (en) * 2003-08-01 2010-12-23 Brocade Communications Systems, Inc. System, method and apparatus for providing multiple access modes in a data communications network
US7735114B2 (en) * 2003-09-04 2010-06-08 Foundry Networks, Inc. Multiple tiered network security system, method and apparatus using dynamic user policy assignment
US8239929B2 (en) 2003-09-04 2012-08-07 Foundry Networks, Llc Multiple tiered network security system, method and apparatus using dynamic user policy assignment
US20050055570A1 (en) * 2003-09-04 2005-03-10 Foundry Networks, Inc. Multiple tiered network security system, method and apparatus using dynamic user policy assignment
US20100223654A1 (en) * 2003-09-04 2010-09-02 Brocade Communications Systems, Inc. Multiple tiered network security system, method and apparatus using dynamic user policy assignment
US20100333191A1 (en) * 2003-09-23 2010-12-30 Foundry Networks, Inc. System and method for protecting cpu against remote access attacks
US8893256B2 (en) 2003-09-23 2014-11-18 Brocade Communications Systems, Inc. System and method for protecting CPU against remote access attacks
US7774833B1 (en) 2003-09-23 2010-08-10 Foundry Networks, Inc. System and method for protecting CPU against remote access attacks
US20050076138A1 (en) * 2003-10-07 2005-04-07 Alcatel Access control listing mechanism for routers
US7509674B2 (en) * 2003-10-07 2009-03-24 Alcatel Lucent Access control listing mechanism for routers
US20050102428A1 (en) * 2003-11-12 2005-05-12 Heintze Nevin C. Memory management for ternary CAMs and the like
US8528071B1 (en) 2003-12-05 2013-09-03 Foundry Networks, Llc System and method for flexible authentication in a data communications network
US20050169273A1 (en) * 2004-01-30 2005-08-04 Srinivas Gadde Parallel hardware arrangement for correlating an external transport address pair with a local endpoint association
US7359381B2 (en) * 2004-01-30 2008-04-15 Hewlett-Packard Development Company, L.P. Parallel hardware arrangement for correlating an external transport address pair with a local endpoint association
US7411910B1 (en) * 2004-07-06 2008-08-12 Juniper Networks, Inc. Systems and methods for automatic provisioning of data flows
US7715438B1 (en) 2004-07-06 2010-05-11 Juniper Networks, Inc. Systems and methods for automatic provisioning of data flows
US7889712B2 (en) 2004-12-23 2011-02-15 Cisco Technology, Inc. Methods and apparatus for providing loop free routing tables
US7869442B1 (en) * 2005-09-30 2011-01-11 Nortel Networks Limited Method and apparatus for specifying IP termination in a network element
US7643496B1 (en) 2005-09-30 2010-01-05 Nortel Networks Limited Application specified steering policy implementation
US7832009B2 (en) 2005-12-28 2010-11-09 Foundry Networks, Llc Techniques for preventing attacks on computer systems and networks
US20090300759A1 (en) * 2005-12-28 2009-12-03 Foundry Networks, Inc. Attack prevention techniques
US20100217936A1 (en) * 2007-02-02 2010-08-26 Jeff Carmichael Systems and methods for processing access control lists (acls) in network switches using regular expression matching logic
US8199644B2 (en) * 2007-02-02 2012-06-12 Lsi Corporation Systems and methods for processing access control lists (ACLS) in network switches using regular expression matching logic
US7706375B2 (en) * 2007-02-06 2010-04-27 Alcatel Lucent System and method of fast adaptive TCAM sorting for IP longest prefix matching
US20080186970A1 (en) * 2007-02-06 2008-08-07 Alcatel Lucent System and method of fast adaptive TCAM sorting for IP longest prefix matching
US8259731B2 (en) 2007-02-06 2012-09-04 Alcatel, Lucent System and method of fast adaptive TCAM sorting for IP longest prefix matching
US20100158016A1 (en) * 2007-02-06 2010-06-24 Alcatel Lucent System and method of fast adaptive tcam sorting for ip longest prefix matching
WO2008121690A2 (en) * 2007-03-30 2008-10-09 Packeteer, Inc. Data and control plane architecture for network application traffic management device
US20080239956A1 (en) * 2007-03-30 2008-10-02 Packeteer, Inc. Data and Control Plane Architecture for Network Application Traffic Management Device
WO2008121690A3 (en) * 2007-03-30 2008-12-18 Packeteer Inc Data and control plane architecture for network application traffic management device
US9419867B2 (en) 2007-03-30 2016-08-16 Blue Coat Systems, Inc. Data and control plane architecture for network application traffic management device
US8059532B2 (en) 2007-06-21 2011-11-15 Packeteer, Inc. Data and control plane architecture including server-side triggered flow policy mechanism
US20080316922A1 (en) * 2007-06-21 2008-12-25 Packeteer, Inc. Data and Control Plane Architecture Including Server-Side Triggered Flow Policy Mechanism
US20090003204A1 (en) * 2007-06-29 2009-01-01 Packeteer, Inc. Lockless Bandwidth Management for Multiprocessor Networking Devices
US7813277B2 (en) * 2007-06-29 2010-10-12 Packeteer, Inc. Lockless bandwidth management for multiprocessor networking devices
US20090083517A1 (en) * 2007-09-25 2009-03-26 Packeteer, Inc. Lockless Processing of Command Operations in Multiprocessor Systems
US8279885B2 (en) 2007-09-25 2012-10-02 Packeteer, Inc. Lockless processing of command operations in multiprocessor systems
US8089961B2 (en) 2007-12-07 2012-01-03 University Of Florida Research Foundation, Inc. Low power ternary content-addressable memory (TCAMs) for very large forwarding tables
US20090150603A1 (en) * 2007-12-07 2009-06-11 University Of Florida Research Foundation, Inc. Low power ternary content-addressable memory (tcams) for very large forwarding tables
US8111707B2 (en) 2007-12-20 2012-02-07 Packeteer, Inc. Compression mechanisms for control plane—data plane processing architectures
US20090161547A1 (en) * 2007-12-20 2009-06-25 Packeteer, Inc. Compression Mechanisms for Control Plane-Data Plane Processing Architectures
US8205040B1 (en) * 2008-01-29 2012-06-19 Juniper Networks, Inc. Storing content in a ternary content addressable memory
US8874876B2 (en) 2011-03-22 2014-10-28 Texas Instruments Incorporated Method and apparatus for packet switching
US20140089506A1 (en) * 2012-09-26 2014-03-27 Krishna P. Puttaswamy Naga Securing software defined networks via flow deflection
US9306840B2 (en) * 2012-09-26 2016-04-05 Alcatel Lucent Securing software defined networks via flow deflection
US20160197845A1 (en) * 2012-09-26 2016-07-07 Alcatel Lucent Securing software defined networks via flow deflection
US9825865B1 (en) * 2015-03-25 2017-11-21 Cisco Technology, Inc. Statistical operations associated with network traffic forwarding
US10382534B1 (en) 2015-04-04 2019-08-13 Cisco Technology, Inc. Selective load balancing of network traffic
US11122114B2 (en) 2015-04-04 2021-09-14 Cisco Technology, Inc. Selective load balancing of network traffic
US11843658B2 (en) 2015-04-04 2023-12-12 Cisco Technology, Inc. Selective load balancing of network traffic
US10142346B2 (en) 2016-07-28 2018-11-27 Cisco Technology, Inc. Extension of a private cloud end-point group to a public cloud
US11489773B2 (en) 2017-11-06 2022-11-01 Pensando Systems Inc. Network system including match processing unit for table-based actions
US11263158B2 (en) 2018-02-22 2022-03-01 Pensando Systems Inc. Programmable computer IO device interface

Also Published As

Publication number Publication date
EP1352334A2 (en) 2003-10-15
US20030056001A1 (en) 2003-03-20
JP3800546B2 (en) 2006-07-26
CN1465014A (en) 2003-12-31
JP2004522383A (en) 2004-07-22
EP1352334A4 (en) 2007-01-03
WO2003012672A2 (en) 2003-02-13
CN1282104C (en) 2006-10-25
WO2003012672A3 (en) 2003-04-17
CA2422439A1 (en) 2003-02-13

Similar Documents

Publication Publication Date Title
US7028098B2 (en) Selective routing of data flows using a TCAM
US7602787B2 (en) Using ternary and binary content addressable memory stages to classify information such as packets
US7408932B2 (en) Method and apparatus for two-stage packet classification using most specific filter matching and transport level sharing
JP3842303B2 (en) System and method for multilayer network elements
US7394809B2 (en) Method and apparatus for packet classification using a forest of hash tables data structure
EP1649389B1 (en) Internet protocol security matching values in an associative memory
US8730967B1 (en) Policy-based virtual routing and forwarding (VRF) assignment
JP4076586B2 (en) Systems and methods for multilayer network elements
US6449256B1 (en) Fast level four switching using crossproducting
US8151339B2 (en) Method and apparatus for implementing filter rules in a network element
US7313666B1 (en) Methods and apparatus for longest common prefix based caching
EP1836808B1 (en) Fibre channel forwarding information base
US10715439B2 (en) Longest prefix matching providing packet processing and/or memory efficiencies in processing of packets
JP2002507366A (en) System and method for quality of service in a multilayer network element
US7624226B1 (en) Network search engine (NSE) and method for performing interval location using prefix matching
US20080186970A1 (en) System and method of fast adaptive TCAM sorting for IP longest prefix matching
US7292569B1 (en) Distributed router forwarding architecture employing global translation indices
US7864776B2 (en) Method and equipment for making a routing decision dependent on a quality-of-service class
US11463357B2 (en) Method and system for propagating network traffic flows between end points based on service and priority policies
US6970971B1 (en) Method and apparatus for mapping prefixes and values of a hierarchical space to other representations
US7551609B2 (en) Data structure for storing and accessing multiple independent sets of forwarding information
US20050038907A1 (en) Routing cache management with route fragmentation
US7299317B1 (en) Assigning prefixes to associative memory classes based on a value of a last bit of each prefix and their use including but not limited to locating a prefix and for maintaining a Patricia tree data structure
US20080123663A1 (en) Method and apparatus for managing ternary content addressable memory entries for use in a data packet routing device
US7512122B1 (en) Identifying QoS flows using indices

Legal Events

Date Code Title Description
AS Assignment

Owner name: AMBER NETWORKS, INC., CALIFORNIA

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:MATE, ASHUTOSH;MAHAMUNI, ATUL;CHANDER, VIJAY;REEL/FRAME:012148/0779

Effective date: 20010905

AS Assignment

Owner name: NOKIA INTELLIGENT EDGE ROUTERS, INC., CALIFORNIA

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:AMBER NETWORKS, INC.;REEL/FRAME:015456/0390

Effective date: 20010828

AS Assignment

Owner name: NOKIA, INC., TEXAS

Free format text: MERGER;ASSIGNOR:NOKIA INTELLIGENT EDGE ROUTERS, INC.;REEL/FRAME:015470/0308

Effective date: 20021015

STCF Information on status: patent grant

Free format text: PATENTED CASE

FPAY Fee payment

Year of fee payment: 4

FPAY Fee payment

Year of fee payment: 8

AS Assignment

Owner name: NOKIA CORPORATION, FINLAND

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:NOKIA INC.;REEL/FRAME:032180/0810

Effective date: 20140116

AS Assignment

Owner name: NOKIA TECHNOLOGIES OY, FINLAND

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:NOKIA CORPORATION;REEL/FRAME:035602/0284

Effective date: 20150116

MAFP Maintenance fee payment

Free format text: PAYMENT OF MAINTENANCE FEE, 12TH YEAR, LARGE ENTITY (ORIGINAL EVENT CODE: M1553)

Year of fee payment: 12